Security Advisories (2)
CVE-2018-10888 (2018-07-10)

A flaw was found in libgit2 before version 0.27.3. A missing check in git_delta_apply function in delta.c file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service.

CVE-2018-10887 (2018-07-10)

A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service.

NAME

Git::Raw::Index::Entry - Git index entry class

VERSION

version 0.82

DESCRIPTION

A Git::Raw::Index::Entry represents an index entry in a Git repository index.

WARNING: The API of this module is unstable and may change without warning (any change will be appropriately documented in the changelog).

METHODS

id( )

Retrieve the id of the index entry as a string.

is_conflict( )

Check if the entry has a non-zero stage entry.

mode( )

Retrieve the mode of the index entry. Note that this is returned as a number, not a string.

path( )

Retrieve the path of the index entry.

size( )

Retrieve the size of the index entry.

stage( )

Retrieve the stage number for the index entry.

blob( )

Retrieve the blob for the the index entry. Returns a Git::Raw::Blob object.

clone( $path )

Clone the entry, but use $path as the entry's path. WARNING: Use with caution. This is only useful for scenarios where a conflict entry should be added to the index where $path should be used.

AUTHOR

Alessandro Ghedini <alexbio@cpan.org>

Jacques Germishuys <jacquesg@striata.com>

LICENSE AND COPYRIGHT

Copyright 2014 Alessandro Ghedini.

This program is free software; you can redistribute it and/or modify it under the terms of either: the GNU General Public License as published by the Free Software Foundation; or the Artistic License.

See http://dev.perl.org/licenses/ for more information.