Continuing our performance improvement series.
This time we focus on startup performance.
Infrastructure:
setuptools-82.0.0
New Packages:
Upgraded Packages:
panel-1.8.9, streamlit-1.55.0, papermill-2.7.0
onnxruntime-1.24.0, google-genai-1.66.0, huggingface-hub-1.6.0
pyomo-6.10.0, pillow-12.1.1
Removed Packages:
Differences among builds:
only slimf (python-3.14 free-threading) has pandas-3.0.1, as pydeck is not fully compatible yet with pandas-3
It is possible to obtain a user's NTLM hash by tricking them into cloning from a malicious server. Since NTLM hashing is weak, it is possible for the attacker to brute-force the user's account name and password.
An attacker who can control a server from which the attack's target clones a repository can extract the NTLM hash, which in turn allows brute-forcing the password. Steps to reproduce:
1- Run responder on host [attacker]
2- Run git clone [victim]
3- attacker receives user's NTLM hash
By brute-forcing the NTLMv2 hash (which is expensive, but possible), credentials can be extracted.
This is a security fix release, addressing CVE-2025-66413.
CVE-2025-66413, Git for Windows: When a user clones a repository from an attacker-controlled server, Git may attempt NTLM authentication and disclose the user's NTLMv2 hash to the remote server. Since NTLM hashing is weak, the captured hash can potentially be brute-forced to recover the user's credentials. This is addressed by disabling NTLM authentication by default.
null for content (#26973)Import-Module.Tests.ps1 to handle Arm32 platform (#26888)Microsoft.PowerShell.PSResourceGet version to 1.2.0 (#27007)ConvertFrom-ClearlyDefinedCoordinates to handle API object coordinates (#26986)cgmanifest.json to actually match the branch (#26982)Continuing our performance improvement series.
This time we focus on startup performance.
Sorry, this website uses features that your browser doesn't support. Upgrade to a newer version of Firefox, Chrome, Safari, or Edge and you'll be all set.