Jump to letter: [
3ABCDEFGHIJKLMNOPQRSTUVWXYZ
]
git-daemon - Git protocol dæmon
- Description:
The git dæmon for supporting git:// access to git repositories
Packages
git-daemon-1.8.3.1-23.el7_8.x86_64
[382 KiB] |
Changelog
by Vít Ondruch (2020-05-25):
- Prevent crafted URL containing new lines, empty host or lacks a scheme
to cause credential leak.
Resolves: CVE-2020-11008
|
git-daemon-1.8.3.1-22.el7_8.x86_64
[382 KiB] |
Changelog
by Ondrej Pohorelsky (2020-04-09):
- Crafted URL containing new lines can cause credential leak
- Resolves: CVE-2020-5260
|
git-daemon-1.8.3.1-21.el7_7.x86_64
[381 KiB] |
Changelog
by Pavel Cahyna (2018-10-19):
- Fix CVE-2018-17456: arbitrary code execution via .gitmodules
Thanks to Jonathan Nieder <jrnieder@gmail.com> for backporting to 2.1.x
and to Steve Beattie <sbeattie@ubuntu.com> for backporting to 1.9.1
|
git-daemon-1.8.3.1-20.el7.x86_64
[381 KiB] |
Changelog
by Pavel Cahyna (2018-10-19):
- Fix CVE-2018-17456: arbitrary code execution via .gitmodules
Thanks to Jonathan Nieder <jrnieder@gmail.com> for backporting to 2.1.x
and to Steve Beattie <sbeattie@ubuntu.com> for backporting to 1.9.1
|
git-daemon-1.8.3.1-14.el7_5.x86_64
[380 KiB] |
Changelog
by Pavel Cahyna (2018-06-18):
- Backport fix for CVE-2018-1123
- Thanks to Jonathan Nieder <jrnieder@gmail.com> for backporting to 2.1.x
and to Steve Beattie <sbeattie@ubuntu.com> for backporting to 1.9.1
|
git-daemon-1.8.3.1-12.el7_4.x86_64
[398 KiB] |
Changelog
by Petr Stodulka (2017-08-11):
- prevent command injection via malicious ssh URLs
Resolves: CVE-2017-1000117
|
git-daemon-1.8.3.1-11.el7.x86_64
[398 KiB] |
Changelog
by Petr Stodulka (2017-05-17):
- dissalow repo names beginning with dash
Resolves: CVE-2017-8386
|
git-daemon-1.8.3.1-6.el7_2.1.x86_64
[398 KiB] |
Changelog
by Petr Stodulka (2016-03-18):
- fix heap overflow CVE-2016-2315 CVE-2016-2324
Resolves: #1318254
|
git-daemon-1.8.3.1-6.el7.x86_64
[397 KiB] |
Changelog
by Petr Stodulka (2015-10-28):
- fix arbitrary code execution via crafted URLs
Resolves: #1274737
|