Re: What's cooking in git.git (topics)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 23 Apr 2008, Ping Yin wrote:
On Wed, Apr 23, 2008 at 2:07 AM, Josef Weidendorfer
 Hmm... At least, it can be very annoying when git fetches data from repositories
 you did not expect, only because submodule URLs change via this
 fallback mechanism. Perhaps it is a little far reached, but suppose a project
 changes its URL, and the old one becomes occupied by a malicious person.
 The problem is that the URL with the now malicious repository is bound in the
 history of the project.

It is always bound now without the fallback patch :)

 For sure, you do not want to fetch from that old repository
 by accident, after you did a checkout of an old commit. And there would be no
 way to protect other people from this malicious repository other than rewriting
 the whole history.

I wonder how the *malicious* repository can hurt us since only the
commit recorded in commit of the super project will be checked out.

If one manages to hack on repository one can modify it enormous amount of ways, including spoofing on SHA (providing wrong contents for it - does git verify that when getting a pack?), utilizing bugs in git etc...

I doubt somebody would spend that much of an effort but you know,
you can not be paranoid *enough* :)

regards,
  Fedor.
--
To unsubscribe from this list: send the line "unsubscribe git" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux