- 29 Jul, 2022 2 commits
- 28 Jul, 2022 4 commits
- 27 Jul, 2022 1 commit
-
-
yuangli committed
-
- 26 Jul, 2022 3 commits
- 19 Jul, 2022 1 commit
-
-
clar: remove ftrunacte from libgit2 tests
Edward Thomson committed
-
- 15 Jul, 2022 1 commit
-
-
Peter Pettersson committed
-
- 14 Jul, 2022 8 commits
-
-
tests: skip flaky-ass googlesource tests
Edward Thomson committed -
sha256: indirection for experimental functions
Edward Thomson committed -
The experimental function signature is only available when `GIT_EXPERIMENTAL_SHA256` is enabled.
Edward Thomson committed -
RFC: SHA256 proof of concept
Edward Thomson committed -
Edward Thomson committed
-
meta: update version number to v1.6.0-alpha
Edward Thomson committed -
Edward Thomson committed
-
v1.5.0
Edward Thomson committed
-
- 13 Jul, 2022 7 commits
-
-
Edward Thomson committed
-
Edward Thomson committed
-
Edward Thomson committed
-
Fix creation of branches and tags with invalid names
Edward Thomson committed -
Edward Thomson committed
-
pack: don't pretend we support pack files v3
Edward Thomson committed -
Edward Thomson committed
-
- 12 Jul, 2022 10 commits
-
-
zlib: update bundled zlib to v1.2.12
Edward Thomson committed -
Fixes for CVE 2022-29187
Edward Thomson committed -
Mark Adler committed
-
slide_hash knowingly reads (possibly) uninitialised memory, see comment lower down about prev[n] potentially being garbage. In this case, the result is never used - so we don't care about MSAN complaining about this read. By adding the no_sanitize("memory") attribute, clients of zlib won't see this (unnecessary) error when building and running with MemorySanitizer. An alternative approach is for clients to build zlib with -fsanitize-ignorelist=... where the ignorelist contains something like 'fun:slide_hash'. But that's more work and needs to be redone for any and all CI systems running a given project with MSAN. Adding this annotation to zlib's sources is overall more convenient - but also won't affect non-MSAN builds. This specific issue was found while running git's test suite, but has also been reported by other clients, see e.g. #518.
Andrzej Hunt committed -
The `crc32_combine_gen64` missed a prototype in our define path. Add one.
Edward Thomson committed -
Edward Thomson committed
-
In the ownership checks implemented for CVE-2022-24765, we disallowed users to access their own repositories when running with `sudo`. Examine the `SUDO_UID` environment variable and allow users running with `sudo`. This matches git's behavior.
Edward Thomson committed -
To match git's behavior with CVE 2022-29187, validate not only the working directory, but also the gitdir and gitlink (if it exists). This a follow up to CVE-2022-24765 that was fixed earlier.
Edward Thomson committed -
Fix erroneously lax configuration ownership checks
Edward Thomson committed -
yuangli committed
-
- 11 Jul, 2022 3 commits