Next | Query returned 36 messages, browsing 21 to 30 | Previous

History of commit frequency

CVS Commit History:


   2016-07-09 15:04:18 by Thomas Klausner | Files touched by this commit (599)
Log message:
Remove python33: adapt all packages that refer to it.
   2015-12-05 22:26:09 by Adam Ciarcinski | Files touched by this commit (578)
Log message:
Extend PYTHON_VERSIONS_INCOMPATIBLE to 35
   2015-11-04 03:47:43 by Alistair G. Crooks | Files touched by this commit (758)
Log message:
Add SHA512 digests for distfiles for www category

Problems found locating distfiles:
	Package haskell-cgi: missing distfile haskell-cgi-20001206.tar.gz
	Package nginx: missing distfile array-var-nginx-module-0.04.tar.gz
	Package nginx: missing distfile encrypted-session-nginx-module-0.04.tar.gz
	Package nginx: missing distfile headers-more-nginx-module-0.261.tar.gz
	Package nginx: missing distfile nginx_http_push_module-0.692.tar.gz
	Package nginx: missing distfile set-misc-nginx-module-0.29.tar.gz
	Package nginx-devel: missing distfile echo-nginx-module-0.58.tar.gz
	Package nginx-devel: missing distfile form-input-nginx-module-0.11.tar.gz
	Package nginx-devel: missing distfile lua-nginx-module-0.9.16.tar.gz
	Package nginx-devel: missing distfile nginx_http_push_module-0.692.tar.gz
	Package nginx-devel: missing distfile set-misc-nginx-module-0.29.tar.gz
	Package php-owncloud: missing distfile owncloud-8.2.0.tar.bz2

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-09-02 14:38:54 by Joerg Sonnenberger | Files touched by this commit (2)
Log message:
Update to Django 1.4.22: Security fixes.
   2015-03-26 23:13:52 by Jonathan Perkin | Files touched by this commit (2)
Log message:
No need to list the same PYTHON_VERSIONS_INCOMPATIBLE version mulitple times.
   2015-03-19 10:57:06 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
Changes 1.4.20:
* Mitigated possible XSS attack via user-supplied redirect URLs
   2015-01-28 07:39:40 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
Changes 1.4.19:
* GZipMiddleware now supports streaming responses. As part of the 1.4.18 \ 
security release, the django.views.static.serve() function was altered to stream \ 
the files it serves. Unfortunately, the GZipMiddleware consumed the stream \ 
prematurely and prevented files from being served properly.
   2015-01-14 18:07:12 by Adam Ciarcinski | Files touched by this commit (4)
Log message:
Fixed securify issues:
* WSGI header spoofing via underscore/dash conflation
* Mitigated possible XSS attack via user-supplied redirect URLs
* Denial-of-service attack against django.views.static.serve
* Database denial-of-service with ModelMultipleChoiceField
   2014-08-23 14:16:45 by Adam Ciarcinski | Files touched by this commit (3)
Log message:
Changes 1.4.14:
Security fixes:
* Issue: reverse() can generate URLs pointing to other hosts (CVE-2014-0480)
* Issue: file upload denial of service (CVE-2014-0481)
* Issue: RemoteUserMiddleware session hijacking (CVE-2014-0482)
* Issue: data leakage via querystring manipulation in admin (CVE-2014-0483)
   2014-06-10 14:01:56 by Joerg Sonnenberger | Files touched by this commit (1)
Log message:
Use MASTER_SITES logic from www/py-django.

Next | Query returned 36 messages, browsing 21 to 30 | Previous