-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: libgit2/libgit2
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v1.6.4
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: libgit2/libgit2
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: maint/v1.6
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 6 commits
- 8 files changed
- 1 contributor
Commits on Jan 12, 2024
-
transport: safely handle messages with no caps
If there are no caps, don't try to advance past the first NULL to look for object-format. This prevents a possible out-of-bounds read.
Configuration menu - View commit details
-
Copy full SHA for 1619a0a - Browse repository at this point
Copy the full SHA 1619a0aView commit details -
revparse: fix parsing bug for trailing
@
When parsing a revspec that ends with a trailing `@`, explicitly stop parsing. Introduce a sentinel variable to explicitly stop parsing. Prior to this, we would set `spec` to `HEAD`, but were looping on the value of `spec[pos]`, so we would continue walking the (new) `spec` at offset `pos`, looking for a NUL. This is obviously an out-of-bounds read. Credit to Michael Rodler (@f0rki) and Amazon AWS Security.
Configuration menu - View commit details
-
Copy full SHA for c9d31b7 - Browse repository at this point
Copy the full SHA c9d31b7View commit details -
index: test adding two identical slash-prefix paths
Ensure that we can `git_index_add` a slash-prefixed path, followed by re-adding the same path. The original entry should be replaced by the new entry.
Configuration menu - View commit details
-
Copy full SHA for 05cf155 - Browse repository at this point
Copy the full SHA 05cf155View commit details -
index: correct index has_dir_name check
`has_dir_name` is used to check for directory/file collisions, and attempts to determine whether the index contains a file with a directory name that is a proper subset of the new index entry that we're trying to add. To determine directory name, the function would walk the path string backwards to identify a `/`, stopping at the end of the string. However, the function assumed that the strings did not start with a `/`. If the paths contain only a single `/` at the beginning of the string, then the function would continue the loop, erroneously, when they should have stopped at the first character. Correct the order of the tests to terminate properly. Credit to Michael Rodler (@f0rki) and Amazon AWS Security.
Configuration menu - View commit details
-
Copy full SHA for eb4c171 - Browse repository at this point
Copy the full SHA eb4c171View commit details Configuration menu - View commit details
-
Copy full SHA for a8a98be - Browse repository at this point
Copy the full SHA a8a98beView commit details Configuration menu - View commit details
-
Copy full SHA for 1555785 - Browse repository at this point
Copy the full SHA 1555785View commit details
Loading
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v1.6.4...maint/v1.6