diff options
author | Baruch Siach <baruch@tkos.co.il> | 2018-05-29 20:38:39 +0300 |
---|---|---|
committer | Peter Korsgaard <peter@korsgaard.com> | 2018-05-29 21:45:36 +0200 |
commit | ae1f0472957c40d67d316cd741467ed5d85fcf40 (patch) | |
tree | 682b3d587878827237ecab62ac3e603a1514086a /docs/website | |
parent | 50d443cbf72fc7940c2970b309de535004173966 (diff) | |
download | buildroot-ae1f0472957c40d67d316cd741467ed5d85fcf40.tar.gz buildroot-ae1f0472957c40d67d316cd741467ed5d85fcf40.zip |
git: security bump to version 2.16.4
Forward port of security fixes from the 2.13.7 release. The 2.13.7
release notes say this:
* Submodule "names" come from the untrusted .gitmodules file, but we
blindly append them to $GIT_DIR/modules to create our on-disk repo
paths. This means you can do bad things by putting "../" into the
name. We now enforce some rules for submodule names which will cause
Git to ignore these malicious names (CVE-2018-11235).
Credit for finding this vulnerability and the proof of concept from
which the test script was adapted goes to Etienne Stalmans.
* It was possible to trick the code that sanity-checks paths on NTFS
into reading random piece of memory (CVE-2018-11233).
Cc: Matt Weber <matthew.weber@rockwellcollins.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'docs/website')
0 files changed, 0 insertions, 0 deletions