| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: libgit2-1_9 | Distribution: openSUSE Tumbleweed |
| Version: 1.9.1 | Vendor: openSUSE |
| Release: 1.1 | Build date: Mon Jun 16 21:23:27 2025 |
| Group: System/Libraries | Build host: reproducible |
| Size: 1375845 | Source RPM: libgit2-1.9.1-1.1.src.rpm |
| Packager: http://bugs.opensuse.org | |
| Url: https://libgit2.github.com/ | |
| Summary: C git library | |
libgit2 is a portable, pure C implementation of the Git core methods provided as a re-entrant linkable library with a solid API, allowing you to write native speed custom Git applications in any language with bindings.
GPL-2.0-only WITH GCC-exception-2.0
* Mon Jun 16 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.9.1:
* hash: allow unsigned int != size_t in sha256
* include: Fix code comment termination
* alternates: allow relative paths in all repositories
* Fix potential null dereference
* attr: honor ignorecase in attribute matching
* tag: Refuse to use HEAD as a tagname
* Fix memory leak in openssl fips modes
* Fix circular includes between types.h and oid.h
* diff: correct diff stat alignment in presence of renames w/ common prefix
* Revert include path regression
* documentation updates
- changes to cmake file placement, add the needed conflict
between -devel and -experimental-devel
- fix Leap build of experimental flavor
* Fri Feb 28 2025 Atri Bhattacharya <badshah400@gmail.com>
- Pass -DEXPERIMENTAL_SHA256=ON to cmake to enable sha256
integration (already being used by opensuse gitea) in a separate
multibuild flavour. This provides downstream libs (like pygit2)
to build against the experimental flavour, should they want to.
* Mon Jan 13 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.9.0
* update TLS cipher selection to match the "compatibility" cipher
suite settings as documented by Mozilla.
* blame API now contains committer information and commit
summaries for blame hunks, and the ability to get information
about the line of text that was modified
* add blame, init commands to CLI
* ABI-breaking changes in blame hunk, checkout, configuration,
update_refs
* new API: git_signature_default_from_env
* packbuilder can now be interrupted from a callback
* honor the preciousObject repository extension
* Push status will be reported even when a push fails
* support generating think packs from a mempack instanct
* New LIBGIT2_VERSION_CHECK macro for version checking
* Custom X509 certificates can be added to OpenSSL's certificate
store using the GIT_OPT_ADD_SSL_X509_CERT option
* Bug fixes and documentation updates
* Thu Oct 31 2024 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.8.4:
* Actually includes the pre-1.8.0 commit constness behavior fix
* Sun Oct 27 2024 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.8.3:
* revert a const-correctness change introduced in v1.8.0 for
the git_commit_create functions. Retain the const-behavior for
the commits arguments from prior to v1.8.0.
* Fix a bug introduced in v1.8.1 for users of the legacy
Node.js http-parser dependency.
* Fri May 17 2024 Dirk Müller <dmueller@suse.com>
- update to 1.8.1:
* In v1.8, libgit2 introduced the `report_unchanged ` member in
the `git_fetch_options` structure. We mistakenly introduced
this as a bitfield, which is not suitable for our public API.
To correct this mistake, we have _removed_ the
`report_unchanged ` member. To support the report unchanged
tips option, users can set the `update_fetchhead`
member to include the `GIT_REMOTE_UPDATE_REPORT_UNCHANGED`
value.
* The libgit2 projects regrets the API change, but this was
required to support cross-platform compatibility.
* commit: Fix git_commit_create_from_stage without author and
* committer
* process.c: fix environ
* Bounds check for pack index read
* transport: provide a useful error message during cancellation
* transport: support sha256 oids
* Revparse: Correctly accept ref with '@' at the end
* remote: drop bitfields in git_remote_fetch_options
* examples: fix memory leak in for-each-ref.c
* xdiff: use proper free function
* rand: avoid uninitialized loadavg warnings
* cli: include alloca on illumos / solaris / sunos
* Update git_array allocator to obey strict aliasing rules
* tree: avoid mixed signedness comparison by @ethomson in
* Sun Mar 24 2024 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.8.0:
* Simplified commit creation (git_commit_create_from_stage)
* Worktree improvements for better compatibility with core git
* ABI breaking channge: Add WORKTREE configuration level.
GIT_CONFIG_LEVEL_WORKTREE level t priority 6,
GIT_CONFIG_LEVEL_APP now begins at priority 7.
* ABI breaking change: git_config_entry structure change
* ABI breaking change: git_push_options includes remote push
options
- the optional, experimental support for invoking OpenSSH remains
disabled in this package
* Wed Feb 07 2024 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.7.2:
* CVE-2024-24575: infinite loop condition given specially crafted
inputs (boo#1219664)
* CVE-2024-24577: arbitrary code execution due to heap corruption
in git_index_add (boo#1219660)
* Fix a bug in the smart transport negotiation could have caused
an out-of-bounds read when a remote server did not advertise
capabilities.
* Tue Aug 15 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.7.1:
* proxy: Return an error for invalid proxy URLs instead of crashing
* ssh: fix known_hosts leak in _git_ssh_setup_conn
* repository: make cleanup safe for re-use with grafts
* fix: Add missing include for oidarray
* Revert "CMake: Search for ssh2 instead of libssh2."
* Wed Jul 19 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.7.0:
* supports shallow clone and shallow repositories
* Simplify custom pluggable allocator (breaking change)
* repo: honor environment variables for more scenarios
* Introduce timeouts on sockets
* some performance improvements and bug fixes
* Wed Apr 12 2023 Andreas Stieger <andreas.stieger@gmx.de>
- Update to 1.6.4:
* config: return GIT_ENOTFOUND for missing programdata
- move experimental cli into libgit2-tools as intended
* Tue Mar 21 2023 Paolo Stivanin <info@paolostivanin.com>
- Update to 1.6.3:
* odb: restore git_odb_open by @ethomson in #6520
* Ensure that git_index_add_all handles ignored directories by @ethomson in #6521
* pack: use 64 bits for the number of objects by @carlosmn in #6530
- Drop restore-git-odb-open.patch
* Tue Mar 21 2023 Daniel Garcia <daniel.garcia@suse.com>
- Add restore-git-odb-open.patch, some code was removed by error
upstream and they fix it after the release.
gh#libgit2/libgit2@e1e0d77c6f15
* Tue Mar 07 2023 Andreas Stieger <andreas.stieger@gmx.de>
- libgit2 1.6.2:
* Support the notion of a home directory separately from global
configuration directory
* stash: partial stash specific files
* push: revpars refspec source, so user can push things that are
not refs
* Support OpenSSL 3
* Many bug fixes
- Not enabled: experimental SHA256 support for bare repositories
* Sun Feb 26 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.5.2:
* Improve SSH key handling functionality: examine all keys in
known_hosts files for matches, to support remote hosts with
multiple key types
* Sat Jan 21 2023 Dirk Müller <dmueller@suse.com>
- update to 1.5.1:
* This is a security release to address CVE-2023-22742: when compiled
using the optional, included libssh2 backend, libgit2 fails to verify
SSH keys by default. boo#1207364
* When using an SSH remote with the optional, included libssh2 backend,
libgit2 does not perform certificate checking by default. Prior versions
of libgit2 require the caller to set the `certificate_check` field of
libgit2's `git_remote_callbacks` structure - if a certificate check
callback is not set, libgit2 does not perform any certificate checking.
This means that by default - without configuring a certificate check
callback, clients will not perform validation on the server SSH keys and
may be subject to a man-in-the-middle attack.
* Wed Dec 21 2022 Dominique Leuenberger <dimstar@opensuse.org>
- Drop baselibs.conf: there is no known consumer of the -32bit
package.
* Thu Jul 14 2022 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.5.0:
* add the basis for an experimental CLI
* continue prepare for SHA256 support
* add a benchmarking utility
* Tue Jul 12 2022 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.4 (bsc#1198234)
* Compatibility with git's changes to address CVE-2022-29187. As
a follow up to CVE 2022-24765, now not only is the working
directory of a non-bare repository examined for its ownership,
but the .git directory and the .git file (if present) are also
examined for their ownership [boo#1201431]
* A fix for compatibility with git's (new) behavior for
CVE 2022-24765 allows users on POSIX systems to access a git
repository that is owned by them when they are running in sudo
- enable reproducible builds
* Wed Apr 13 2022 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.3:
* compatibility with git's changes for CVE-2022-24765 boo#1187234
* several correctness fixes where invalid input can lead to a
crash and denial of service
* Thu Mar 17 2022 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.2:
* remote: do store the update_tips callback error value
* Sat Feb 19 2022 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.1:
* improve compatibility with git
* some deprecated API, ABI has changed
* multiple bug fixes and developer visible changes
- build with system PCRE2
- remove http-parser build dependency, bundled lib has fixes
/usr/lib/libgit2.so.1.9 /usr/lib/libgit2.so.1.9.1 /usr/share/doc/packages/libgit2-1_9 /usr/share/doc/packages/libgit2-1_9/AUTHORS /usr/share/doc/packages/libgit2-1_9/README.md /usr/share/licenses/libgit2-1_9 /usr/share/licenses/libgit2-1_9/COPYING
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Oct 24 23:31:51 2025