comment
This commit is contained in:
parent
aff6c12949
commit
5fb307f1c5
2 changed files with 21 additions and 17 deletions
|
@ -24,20 +24,3 @@ configs.
|
||||||
|
|
||||||
Is it at all common to set `git config fetch.fsckObjects true` or
|
Is it at all common to set `git config fetch.fsckObjects true` or
|
||||||
`git config receive.fsckObjects` true?
|
`git config receive.fsckObjects` true?
|
||||||
|
|
||||||
> BTW, I have to mention that I'm deeply unhappy for git for making this
|
|
||||||
> change, with such a
|
|
||||||
> [weak justification](https://github.com/git/git/commit/a33fea0886cfa016d313d2bd66bdd08615bffbc9),
|
|
||||||
> and so little care for breakage.
|
|
||||||
>
|
|
||||||
> The change came after a security fix which involved symlinks and
|
|
||||||
> `.git/objects`, but that was a symlink *inside* `.git/objects`,
|
|
||||||
> which is entirely different than a symlink pointing into the
|
|
||||||
> `.git` directory.
|
|
||||||
>
|
|
||||||
> While it's understandable that someone encountering a
|
|
||||||
> symlink related security hole may want to throw out the baby with the
|
|
||||||
> bathwater, what they have actually done here is to only throw out the
|
|
||||||
> baby. This change will not prevent the class of security hole that
|
|
||||||
> motivated it.
|
|
||||||
> --[[Joey]]
|
|
||||||
|
|
|
@ -0,0 +1,21 @@
|
||||||
|
[[!comment format=mdwn
|
||||||
|
username="joey"
|
||||||
|
subject="""comment 1"""
|
||||||
|
date="2024-05-21T21:47:38Z"
|
||||||
|
content="""
|
||||||
|
BTW, I have to mention that I'm deeply unhappy for git for making this
|
||||||
|
change, with such a
|
||||||
|
[weak justification](https://github.com/git/git/commit/a33fea0886cfa016d313d2bd66bdd08615bffbc9),
|
||||||
|
and so little care for breakage.
|
||||||
|
|
||||||
|
The change came after a security fix which involved symlinks and
|
||||||
|
`.git/objects`, but that was a symlink *inside* `.git/objects`,
|
||||||
|
which is entirely different than a symlink pointing into the
|
||||||
|
`.git` directory.
|
||||||
|
|
||||||
|
While it's understandable that someone encountering a
|
||||||
|
symlink related security hole may want to throw out the baby with the
|
||||||
|
bathwater, what they have actually done here is to only throw out the
|
||||||
|
baby. This change will not prevent the class of security hole that
|
||||||
|
motivated it.
|
||||||
|
"""]]
|
Loading…
Add table
Add a link
Reference in a new issue