Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

submodule: ignore path and url attributes if they look like options #4837

Merged
merged 2 commits into from Oct 5, 2018

Conversation

pks-t
Copy link
Member

@pks-t pks-t commented Oct 5, 2018

These can be used to inject options in an implementation which performs a
recursive clone by executing an external command via crafted url and path
attributes such that it triggers a local executable to be run.

The library is not vulnerable as we do not rely on external executables but a
user of the library might be relying on that so we add this protection.

This matches this aspect of git's fix for CVE-2018-17456.


This has been released as part of v0.26.7 and v0.27.5

These can be used to inject options in an implementation which performs a
recursive clone by executing an external command via crafted url and path
attributes such that it triggers a local executable to be run.

The library is not vulnerable as we do not rely on external executables but a
user of the library might be relying on that so we add this protection.

This matches this aspect of git's fix for CVE-2018-17456.
@pks-t pks-t merged commit a8d447f into libgit2:master Oct 5, 2018
@pks-t pks-t deleted the cmn/reject-option-submodule-url-path branch October 5, 2018 18:13
@pks-t
Copy link
Member Author

pks-t commented Oct 5, 2018

This has been discussed in private already

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants