GitHub Enterprise 2.1 is now deprecated. That means that no patch releases will be made, even for critical security issues, after this release. For better performance, improved security, and new features, upgrade to the newest version of GitHub Enterprise as soon as possible.
Thanks!
The GitHub Team
_gh_render
cookie, potentially allowing the render cookie to be sent in plaintext HTTP requests. However, Enterprise sets the Strict-Transport-Security
header for modern browsers when SSL is enabled, which largely mitigates the issue.Thanks!
The GitHub Team
ca-certificates
package has been updated to remove outdated certificate authority (CA) certificates. This update refreshes the included certificates and removes the SPI CA and CA certificates with 1024-bit RSA keys.Thanks!
The GitHub Team
glibc
packages have been updated to address CVE-2015-7547, a getaddrinfo
stack-based buffer overflow.libssh
packages have been updated to address CVE-2016-0739, a weakness in diffie-hellman secret key generation.nss
packages have been updated to address CVE-2016-1938.Thanks!
The GitHub Team
Management console sessions can expire too quickly for Safari users.
Promoting a high availability replica can fail if Elasticsearch takes too long to restart.
A high availability replica that's been promoted to primary and then set up as a replica again doesn't properly show the replica status page, but shows 'Starting...' instead.
Some processes continued to write to logs after they were rotated. This could cause the root file system to fill up.
Gist profile pages don't have proper styling when subdomain isolation disabled.
SNMP can't be run on high availability replicas.
Custom firewall rules aren't maintained during an upgrade.
Deleting a user doesn't delete their gists, which can cause problems with replication.
In our instructions to merge a pull request on the command line, we show the steps to merge using the Git protocol even when private mode is on. Private mode forces authentication but the Git protocol is unauthenticated so the steps will always fail. We also don't show the steps to merge using SSH.
Accessing GitHub Enterprise using a hostname alias with private mode enabled as an unauthenticated user will redirect you to the dashboard instead of the page you were trying to visit after you log in.
We display the time in the scheduled maintenance banner in UTC instead of the viewer's timezone.
Users with LDAP DNs longer than 255 characters are suspended if LDAP Sync is enabled.
Images uploaded to issues save with an absolute URL, so they can be broken if the hostname changes.
With private mode enabled, a Pages site with no default page serves a generic error rather than an informative message.
HIGH (CVE-2015-7547) 2.1 is vulnerable to glibc getaddrinfo stack-based buffer overflow
. To manually patch your appliance, apply the hotfix by connecting to your appliance via SSH and running these commands: (updated 2016-02-17)
$ curl -O https://github-enterprise.s3.amazonaws.com/patches/github-enterprise-libc-precise.hpkg
$ md5sum github-enterprise-libc-precise.hpkg # c068256696f2775579e2cd8223f82306
$ chmod +x github-enterprise-libc-precise.hpkg
$ ./github-enterprise-libc-precise.hpkg
GitHub Enterprise 2.1 will be deprecated as of April 4, 2016. That means that no patch releases will be made, even for critical security issues, after this date. For better performance, improved security, and new features, upgrade to the newest version of GitHub Enterprise as soon as possible.
Thanks!
The GitHub Team
Thanks!
The GitHub Team
Thanks!
The GitHub Team
Thanks!
The GitHub Team
Thanks!
The GitHub Team
.mediawiki
suffix could leak information to the Google Chart API when they were displayed.Thanks!
The GitHub Team
Thanks!
The GitHub Team
Thanks!
The GitHub Team
Thanks!
The GitHub Team
Thanks!
The GitHub Team
Thanks!
The GitHub Team
Thanks!
The GitHub Team
git
user's authorized_keys file, which caused warning messages to be logged on the primary.Ubuntu kernel and packages have been updated to the latest security versions.
LOW: Update libssh
to address denial of service vulnerabilities CVE-2014-8132 and CVE-2015-3145.
LOW: Disable SSLv2 and SSLv3 in Postfix.
We've improved the validation of the SAML responses we receive. A response message must now contain a Recipient
set to the Assertion Consumer Service URL, http(s)://[hostname]/saml/consume
.
In addition to the Recipient
attribute, GitHub Enterprise will now also verify the Destination
and Audience
attributes, if they are supplied in the response message.
Most SAML implementations already provide this information in their responses.
ghe-repl-setup
to hang.github_audit
log stream are being logged twice.Thanks!
The GitHub Team
ghe-btop
's --usage
and --help
flags were not being passed correctly..
.ghe-repl-setup
did not warn if the master had an existing replica.kexec
rather than reboot
.ghe-service-list
did not list github-svn-proxy
or github-timerd
.resqued
, svn-proxy
and timerd
held on to a deleted log file rather than rotating correctly.ghe-repl-setup
to hang.github_audit
log stream are being logged twice.Thanks!
The GitHub Team
altSecurityIdentities
attributes.ghe-support-bundle
command line utility to make it possible to upload a support bundle directly to GitHub from the VM.public_repo
scope, requests for lists of issues would return issues from private repositories.ghe-repl-setup
to hang.github_audit
log stream are being logged twice.The GitHub Team
man
pages.ghe-upgrade
command produced the following harmless error: line 205: /dev/null/: Is a directory
.ghe-repl-setup
to hang.github_audit
log stream are being logged twice.ghe-ssl-ca-certificate-install
were lost after upgrading.userAccountControl
attribute wasn't present. That's usually the case when the directory isn't ActiveDirectory unless the attribute was added with a custom schema.ghe-org-owner-promote
command line utility was broken.ghe-upgrade
command will output the following harmless error: line 205: /dev/null/: Is a directory
ghe-repl-setup
to hang.ghe-repl-promote
.github_audit
log stream are being logged twice.ghe-repl-promote
was fixed in 2.0.2.ghe-repl-setup
to hang.ghe-repl-promote
.ghe-org-owner-promote
command line utility is currently broken.github_audit
log stream are being logged twice.ghe-upgrade
.ghe-repl-promote
was fixed in 2.0.2.Thanks!
The GitHub Team
NameID
, but didn't include email
as a released attribute, users could sign in the first time but couldn't sign in again after signing out.$
, _
, .
.From:
address was wrong in notification emails if the "no-reply" email address was configued, using the SMTP HELO domain instead.ghe-repl-status
was missing how far behind replication was.undefined
instead of the hostname and Ruby version.nice
so it won't affect anything else).ghe-repl-setup
to hang.ghe-repl-promote
.ghe-org-owner-promote
command line utility is currently broken.github_audit
log stream are being logged twice.ghe-upgrade
.gethostbyname
. Also known as the GHOST vulnerability.Qualys researchers have found a buffer overflow vulnerability in the gethostbyname
function in the C standard library that could allow remote code execution under some circumstances. There is currently no known way to exploit GitHub Enterprise remotely using this vulnerability, as many services don't use gethostbyname
in a way that is exploitable. However, as a precaution we recommend upgrading to this latest patch release or to a later version.
ghe-repl-promote
was fixed in 2.0.2.Thanks!
The GitHub Team
https://enterprise.github.com/releases
https://enterprise.github.com/releases/2.1.1
The following important security vulnerabilities have been fixed in the 2.1.1 release:
gethostbyname
. Also known as the GHOST vulnerability.Qualys researchers have found a buffer overflow vulnerability in the gethostbyname
function in the C standard library that could allow remote code execution under some circumstances. There is currently no known way to exploit GitHub Enterprise remotely using this vulnerability, as many services don't use gethostbyname
in a way that is exploitable. However, as a precaution we recommend upgrading to this latest patch release or to a later version.
If you have any questions, please contact support at enterprise@github.com
Thanks!
The GitHub Team
The 2.1.0 release for GitHub Enterprise is now available for download from https://enterprise.github.com/download. We've listed out all the included features, bug fixes, and known issues below, and have also drafted up a set of upgrade instructions to help make your migration as smooth as possible.
With the new features added in GitHub Enterprise 2.1.0, you can:
/pulls
and /issues
dashboard pages.ghe-btop
command line utility.ghe-repl-status
was really slow. We made it faster.github_audit
log stream.To keep GitHub Enterprise as secure as possible, we have removed support for the cryptographically weak RC4 cipher in our SSL configuration. With the removal of RC4, Internet Explorer on Windows XP will no longer be able to access GitHub Enterprise. You can read more about this change in our announcement on GitHub.com.
ghe-repl-setup
to hang.ghe-repl-promote
.ghe-org-owner-promote
command line utility is currently broken.github_audit
log stream are being logged twice.ghe-upgrade
.ghe-repl-promote
was fixed in 2.0.2.