diff options
author | Junio C Hamano <gitster@pobox.com> | 2015-09-28 15:33:56 -0700 |
---|---|---|
committer | Junio C Hamano <gitster@pobox.com> | 2015-09-28 15:33:56 -0700 |
commit | 11a458befcd7662fbe6d2d53c76d49ae2b0fe219 (patch) | |
tree | de4cf6a8a43cb30b53f924ed8820de09409f0afd /Documentation/RelNotes | |
parent | ee6ad5f4d56e697c972af86cbefdf269b386e470 (diff) | |
parent | a2558fb8e1e387b630312311e1d22c95663da5d0 (diff) | |
download | git-11a458befcd7662fbe6d2d53c76d49ae2b0fe219.tar.gz git-11a458befcd7662fbe6d2d53c76d49ae2b0fe219.tar.xz |
Sync with 2.4.10
Diffstat (limited to 'Documentation/RelNotes')
-rw-r--r-- | Documentation/RelNotes/2.3.10.txt | 18 | ||||
-rw-r--r-- | Documentation/RelNotes/2.4.10.txt | 18 |
2 files changed, 36 insertions, 0 deletions
diff --git a/Documentation/RelNotes/2.3.10.txt b/Documentation/RelNotes/2.3.10.txt new file mode 100644 index 000000000..9d425d814 --- /dev/null +++ b/Documentation/RelNotes/2.3.10.txt @@ -0,0 +1,18 @@ +Git v2.3.10 Release Notes +========================= + +Fixes since v2.3.9 +------------------ + + * xdiff code we use to generate diffs is not prepared to handle + extremely large files. It uses "int" in many places, which can + overflow if we have a very large number of lines or even bytes in + our input files, for example. Cap the input size to soemwhere + around 1GB for now. + + * Some protocols (like git-remote-ext) can execute arbitrary code + found in the URL. The URLs that submodules use may come from + arbitrary sources (e.g., .gitmodules files in a remote + repository), and can hurt those who blindly enable recursive + fetch. Restrict the allowed protocols to well known and safe + ones. diff --git a/Documentation/RelNotes/2.4.10.txt b/Documentation/RelNotes/2.4.10.txt new file mode 100644 index 000000000..8621199bc --- /dev/null +++ b/Documentation/RelNotes/2.4.10.txt @@ -0,0 +1,18 @@ +Git v2.4.10 Release Notes +========================= + +Fixes since v2.4.9 +------------------ + + * xdiff code we use to generate diffs is not prepared to handle + extremely large files. It uses "int" in many places, which can + overflow if we have a very large number of lines or even bytes in + our input files, for example. Cap the input size to soemwhere + around 1GB for now. + + * Some protocols (like git-remote-ext) can execute arbitrary code + found in the URL. The URLs that submodules use may come from + arbitrary sources (e.g., .gitmodules files in a remote + repository), and can hurt those who blindly enable recursive + fetch. Restrict the allowed protocols to well known and safe + ones. |