CVE-2017-8386.patch
CVE-2017-1000117.patch
shell-drop-git-cvsserver-support-by-default.diff
cvsserver-use-safe_pipe_capture.diff
cvsimport-shell-quote-variable-used-in-backticks.diff
archimport-use-safe_pipe_capture-for-user-input.diff
0001-submodule-config-verify-submodule-names-as-paths.patch
0002-is_ntfs_dotgit-use-a-size_t-for-traversing-string.patch
0003-is_hfs_dotgit-match-other-.git-files.patch
0004-is_ntfs_dotgit-match-other-.git-files.patch
0005-is_-hfs-ntfs-_dotgitmodules-add-tests.patch
0006-skip_prefix-add-case-insensitive-variant.patch
0007-verify_path-drop-clever-fallthrough.patch
0008-verify_dotfile-mention-case-insensitivity-in-comment.patch
0009-update-index-stat-updated-files-earlier.patch
0010-verify_path-disallow-symlinks-in-.gitmodules.patch
0011-sha1_file-add-read_loose_object-function.patch
0012-fsck-parse-loose-object-paths-directly.patch
0013-index-pack-make-fsck-error-message-more-specific.patch
0014-fsck-simplify-.git-check.patch
0015-fsck-actually-fsck-blob-data.patch
0016-fsck-detect-gitmodules-files.patch
0017-fsck-check-.gitmodules-content.patch
0018-fsck-call-fsck_finish-after-fscking-objects.patch
0019-unpack-objects-call-fsck_finish-after-fscking-object.patch
0020-index-pack-check-.gitmodules-files-with-strict.patch
0021-fsck-complain-when-.gitmodules-is-a-symlink.patch
0001-submodule-helper-use-to-signal-end-of-clone-options.patch
0002-submodule-config-ban-submodule-urls-that-start-with-.patch
0003-submodule-config-ban-submodule-paths-that-start-with.patch
0004-fsck-detect-submodule-urls-starting-with-dash.patch
0005-fsck-detect-submodule-paths-starting-with-dash.patch
0006-cvsimport-apply-shell-quoting-regex-globally.patch
CVE-2017-15298.patch
