Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 10298d6

Browse files
committed
security: fix the indentation for some older entries
1 parent 9901296 commit 10298d6

File tree

1 file changed

+3
-6
lines changed

1 file changed

+3
-6
lines changed

security/index.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -73,24 +73,21 @@ Etienne Stalmans) same as v0.27.1.
7373
Ignores submodule configuration entries with names which attempt to perform path
7474
traversal and can be exploited to write to an arbitrary path or for remote code
7575
execution. `libgit2` itself is not vulnerable to RCE but tool implementations
76-
which execute hooks after fetching might be. This is CVE-2018-11235.
77-
76+
which execute hooks after fetching might be. This is CVE-2018-11235.<br/><br/>
7877
It is forbidden for a `.gitmodules` file to be a symlink which could cause a Git
7978
implementation to write outside of the repository and and bypass the fsck checks
8079
for CVE-2018-11235.
8180

8281
* **[libgit2 v0.26.2](https://github.com/libgit2/libgit2/releases/tag/v0.26.2)**, March 8th, 2018
8382
Fixes memory handling issues when reading crafted repository index files. The
8483
issues allow for possible denial of service due to allocation of large memory
85-
and out-of-bound reads.
86-
84+
and out-of-bound reads.<br/><br/>
8785
As the index is never transferred via the network, exploitation requires an
8886
attacker to have access to the local repository.
8987

9088
* **[libgit2 v0.26.1](https://github.com/libgit2/libgit2/releases/tag/v0.26.1)**, March 7th, 2018
9189
Updates the bundled zlib to 1.2.11. Users who build the bundled zlib are
92-
vulnerable to security issues in the prior version.
93-
90+
vulnerable to security issues in the prior version.<br/><br/>
9491
This does not affect you if you rely on a system-installed version of zlib. All
9592
users of v0.26.0 who use the bundled zlib should upgrade to this release.
9693

0 commit comments

Comments
 (0)