diff options
author | Johannes Schindelin <johannes.schindelin@gmx.de> | 2019-12-04 21:31:10 (GMT) |
---|---|---|
committer | Johannes Schindelin <johannes.schindelin@gmx.de> | 2019-12-06 15:30:49 (GMT) |
commit | d851d94151734db8234b0a3dba7783bce36dd00b (patch) | |
tree | 667452c16966204ffdc71623e5b4334fd539c3d1 /Documentation/RelNotes/2.18.2.txt | |
parent | 0d0ac3826a3bbb9247e39e12623bbcfdd722f24c (diff) | |
parent | caccc527ca7f4b3e6f4bb6775cbff94b27741482 (diff) | |
download | git-d851d94151734db8234b0a3dba7783bce36dd00b.zip git-d851d94151734db8234b0a3dba7783bce36dd00b.tar.gz git-d851d94151734db8234b0a3dba7783bce36dd00b.tar.bz2 |
Sync with 2.19.3
* maint-2.19: (34 commits)
Git 2.19.3
Git 2.18.2
Git 2.17.3
Git 2.16.6
test-drop-caches: use `has_dos_drive_prefix()`
Git 2.15.4
Git 2.14.6
mingw: handle `subst`-ed "DOS drives"
mingw: refuse to access paths with trailing spaces or periods
mingw: refuse to access paths with illegal characters
unpack-trees: let merged_entry() pass through do_add_entry()'s errors
quote-stress-test: offer to test quoting arguments for MSYS2 sh
t6130/t9350: prepare for stringent Win32 path validation
quote-stress-test: allow skipping some trials
quote-stress-test: accept arguments to test via the command-line
tests: add a helper to stress test argument quoting
mingw: fix quoting of arguments
Disallow dubiously-nested submodule git directories
protect_ntfs: turn on NTFS protection by default
path: also guard `.gitmodules` against NTFS Alternate Data Streams
...
Diffstat (limited to 'Documentation/RelNotes/2.18.2.txt')
-rw-r--r-- | Documentation/RelNotes/2.18.2.txt | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/Documentation/RelNotes/2.18.2.txt b/Documentation/RelNotes/2.18.2.txt new file mode 100644 index 0000000..98b168a --- /dev/null +++ b/Documentation/RelNotes/2.18.2.txt @@ -0,0 +1,8 @@ +Git v2.18.2 Release Notes +========================= + +This release merges up the fixes that appear in v2.14.6, v2.15.4 +and in v2.17.3, addressing the security issues CVE-2019-1348, +CVE-2019-1349, CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, +CVE-2019-1353, CVE-2019-1354, and CVE-2019-1387; see the release notes +for those versions for details. |