Re: status on security of embedded repos?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hey Johannes.


On Tue, 2022-09-06 at 15:56 +0200, Johannes Schindelin wrote:
> But libgit2 and JGit, two separate Git implementations that are in
> wide
> use, too, probably do not have support for this.
> 
> In other words, users of libgit2 & JGit will likely be unaffected by
> setting `safe.bareRepository` and sill still need to take manual
> precautions.


> If you are using applications based on those projects, you might be
> interested in porting support for `safe.bareRepository` to those
> projects
> and contribute the enhancement.

Well I'm not really in any way experienced with git's code ... so I'm
rather just wearing a user hat.

Wouldn't it make sense if someone really experienced within git
development to kinda follow that up for other projects, too?
Sure, it's other projects,... but still, the vulnerability seems rather
critical and many people using git also use such things like libgit2
(potentially even without knowing).

I can however open a ticket over at libgit2, if that helps you.

Also, even with default settings, git, AFAIU, would be still vulnerable
for the majority of people (many of whom likely haven't even heard
about the issue).


> 
> Yes, indeed, `.git` entries in Git's tree objects are forbidden.

And I blindly assume that this is not only checked and forbidden when
trying to commit, but also when cloning/fetching/etc.?!


Thanks for your answers :-)
Chris.



[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux