The 2.8 series release notes contain important changes in this release series.
Note about Git LFS v2.1.1
A CRITICAL security fix for the Git LFS client was released on 19 May. The remote code execution vulnerability can be exploited if:
-
a repository contains a .lfsconfig
with:
...
url = ssh://-oProxyCommand=command
...
-
a user clones the malicious repository with a vulnerable Git LFS client
This vulnerability exists in the Git LFS client and not GitHub Enterprise. However, we strongly encourage all users of GitHub Enterprise to upgrade their Git LFS client to v2.1.1 (or greater) from https://git-lfs.github.com/.
Please contact GitHub Enterprise Support if you have any questions.
Note: GitHub Enterprise supports broadcasting messages directly on the application with ghe-announce
and Creating a custom sign in message.
Security Fixes
- This release and previous releases of GitHub Enterprise are not affected by the Git shell vulnerability announced 10 May 2017 (CVE-2017-8386).
- Packages have been updated to the latest security versions.
Bug Fixes
- When LDAP Sync is enabled, only organization owners could search the LDAP directory for groups when creating a new team.
- Deleting a repository containing files in LFS could cause the 'File storage' within the Site Admin to show a temporary 500 error.
- In a clustering environment,
ghe-cluster-status
would use the configured proxy when querying each node.
- In a clustering environment, restoring a backup to a cluster not meeting the minimum recommended number of
pages-server
and storage-server
nodes would fail.
- Pagination of a webhook's 'Recent Deliveries' was not enabled, limiting access to the last ten deliveries.
- In clustering and high availability environments, the disk usage percentage and tooltip in the admin bar were incorrect.
Changes
- The GitHub Enterprise version is shown on the hypervisor welcome console.
- The SAML authentication logs no longer contain debug information by default. Debugging information can be enabled in the Admin Center.
- In a clustering environment, a failure to retrieve a support bundle from a node is reported as an error. It was reported as a warning.
Known Issues
- We incorrectly redirect to the dashboard if you accessed GitHub Enterprise using an alias while in private mode. This might happen if you set a fully qualified domain name but the subdomain resolves correctly.
- Images uploaded to issues save with an absolute URL, so they can be broken if the hostname changes.
- On a freshly set up GitHub Enterprise without any users, an attacker could create the first admin user.
- Custom firewall rules aren't maintained during an upgrade.
- Enqueued background jobs are sometimes not purged when a repository is deleted.
svn checkout
may timeout while the repository data cache is being built. In most cases, subsequent svn checkout
attempts will succeed.
- Git LFS tracked files uploaded through the web interface are incorrectly added directly to the repository.
- GitHub Enterprise clustering can not be configured without https.
- Deleting a search index doesn't delete all associated metadata, which are then incorrectly reused if a new search index is created. This causes search index repair jobs to be reported as finished in the site admin when they were not.
- collectd metric paths can be truncated, which causes multiple write attempts to the same file for different metrics. (updated 2017-07-10)
- After changing the visibility of a repository, wiki search results have a conflicting number of displayed search results. Administrators can reindex the wiki through the site admin dashboard. (updated 2017-11-09)
Thanks!
The GitHub Team