The 2.8 series release notes contain important changes in this release series.
Security Fixes
- LOW: An internal upload policies API disclosed which users had push access to a repository.
- LOW: An internal administrative API was vulnerable to cross-site request forgery (CSRF).
- Packages have been updated to the latest security versions.
Bug Fixes
- Attempting to convert a user to an organization failed with an internal server error.
- Git LFS objects could take up to an hour to replicate in a High Availability configuration.
- In a clustering environment, reindexing failed when a pull request routes to an offline repository.
svn checkout
could incorrectly fail with a 429 HTTP error code.
- Copy to clipboard buttons failed for Internet Explorer 11 users.
- Pre-receive hooks failed to output UTF-8 characters.
- Migrations failed to preserve a label with a
/
character.
- A previously configured replica appliance excessively logged errors during High Availability initialization.
- Pre-receive hooks could fail with
Device or resource busy
.
- LDAP synchronization incorrectly removed users after a server-side LDAP timeout.
- An
Encoding::Compatibility
error occurred when viewing a webhook from /stafftools
.
- The Management Console Add new SSH key field incorrectly allowed an SSH fingerprint instead of the contents of the key.
- A former primary appliance failed to create or update pre-receive hook environments.
- In a clustering environment, services were incorrectly started after reboot.
- Pre-receive hooks checking internal or temporary Git references failed.
- In a clustering environment, releases, uploads, avatars, and LFS files could fail to be accessible after a
storage-server
is removed.
- In a clustering environment,
storage-server
repair jobs took a long time when a new storage-server
is added.
- In a clustering environment, the
enterprise-manage
and resolvconf
service were incorrectly stopped after ghe-cluster-config-apply
.
- An updated SAML Verification certificate did not take effect until the
github-unicorn
service was restarted.
Changes
- The Reactivate suspended users configuration has changed to reflect the current configured state.
- The
<Destination>
element is no longer optional in the SAML response.
Deprecation of GitHub Enterprise 2.4
GitHub Enterprise 2.4 is now deprecated as of February 9, 2017. That means that no patch releases will be made, even for critical security issues, after this release. For better performance, improved security, and new features, upgrade to the newest version of GitHub Enterprise as soon as possible.
Upcoming deprecation of GitHub Enterprise 2.5
GitHub Enterprise 2.5 will be deprecated as of March 14, 2017. That means that no patch releases will be made, even for critical security issues, after this date. For better performance, improved security, and new features, upgrade to the newest version of GitHub Enterprise as soon as possible.
Known Issues
- We incorrectly redirect to the dashboard if you accessed GitHub Enterprise using an alias while in private mode. This might happen if you set a fully qualified domain name but the subdomain resolves correctly.
- Images uploaded to issues save with an absolute URL, so they can be broken if the hostname changes.
- On a freshly set up GitHub Enterprise without any users, an attacker could create the first admin user.
- Custom firewall rules aren't maintained during an upgrade.
- Enqueued background jobs are sometimes not purged when a repository is deleted.
svn checkout
may timeout while the repository data cache is being built. In most cases, subsequent svn checkout
attempts will succeed.
- Git LFS tracked files uploaded through the web interface are incorrectly added directly to the repository.
- GitHub Enterprise clustering can not be configured without https.
- Graphs in the Management Console monitoring page are incorrectly sorted.
- The initial import of the VMware OVA image may fail when deployed via vCenter Server 6.0 or 6.5. The import will succeed when performed directly on an ESXi host.
- An issue or pull request comment containing the string "User-Agent: GitHub-Hookshot" incorrectly triggers a firewall rule and causes an internal server error on several pages, including the author's profile page. (updated 2017-03-30)
- collectd metric paths can be truncated, which causes multiple write attempts to the same file for different metrics. (updated 2017-07-10)
- After changing the visibility of a repository, wiki search results have a conflicting number of displayed search results. Administrators can reindex the wiki through the site admin dashboard. (updated 2017-11-09)
Thanks!
The GitHub Team