2016-07-09 15:04:18 by Thomas Klausner | Files touched by this commit (599) |
Log message:
Remove python33: adapt all packages that refer to it.
|
2015-12-05 22:26:09 by Adam Ciarcinski | Files touched by this commit (578) |
Log message:
Extend PYTHON_VERSIONS_INCOMPATIBLE to 35
|
2015-11-04 03:47:43 by Alistair G. Crooks | Files touched by this commit (758) |
Log message:
Add SHA512 digests for distfiles for www category
Problems found locating distfiles:
Package haskell-cgi: missing distfile haskell-cgi-20001206.tar.gz
Package nginx: missing distfile array-var-nginx-module-0.04.tar.gz
Package nginx: missing distfile encrypted-session-nginx-module-0.04.tar.gz
Package nginx: missing distfile headers-more-nginx-module-0.261.tar.gz
Package nginx: missing distfile nginx_http_push_module-0.692.tar.gz
Package nginx: missing distfile set-misc-nginx-module-0.29.tar.gz
Package nginx-devel: missing distfile echo-nginx-module-0.58.tar.gz
Package nginx-devel: missing distfile form-input-nginx-module-0.11.tar.gz
Package nginx-devel: missing distfile lua-nginx-module-0.9.16.tar.gz
Package nginx-devel: missing distfile nginx_http_push_module-0.692.tar.gz
Package nginx-devel: missing distfile set-misc-nginx-module-0.29.tar.gz
Package php-owncloud: missing distfile owncloud-8.2.0.tar.bz2
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
|
2015-09-02 14:38:54 by Joerg Sonnenberger | Files touched by this commit (2) |
Log message:
Update to Django 1.4.22: Security fixes.
|
2015-03-26 23:13:52 by Jonathan Perkin | Files touched by this commit (2) |
Log message:
No need to list the same PYTHON_VERSIONS_INCOMPATIBLE version mulitple times.
|
2015-03-19 10:57:06 by Adam Ciarcinski | Files touched by this commit (2) |
Log message:
Changes 1.4.20:
* Mitigated possible XSS attack via user-supplied redirect URLs
|
2015-01-28 07:39:40 by Adam Ciarcinski | Files touched by this commit (2) |
Log message:
Changes 1.4.19:
* GZipMiddleware now supports streaming responses. As part of the 1.4.18 \
security release, the django.views.static.serve() function was altered to stream \
the files it serves. Unfortunately, the GZipMiddleware consumed the stream \
prematurely and prevented files from being served properly.
|
2015-01-14 18:07:12 by Adam Ciarcinski | Files touched by this commit (4) |
Log message:
Fixed securify issues:
* WSGI header spoofing via underscore/dash conflation
* Mitigated possible XSS attack via user-supplied redirect URLs
* Denial-of-service attack against django.views.static.serve
* Database denial-of-service with ModelMultipleChoiceField
|
2014-08-23 14:16:45 by Adam Ciarcinski | Files touched by this commit (3) |
Log message:
Changes 1.4.14:
Security fixes:
* Issue: reverse() can generate URLs pointing to other hosts (CVE-2014-0480)
* Issue: file upload denial of service (CVE-2014-0481)
* Issue: RemoteUserMiddleware session hijacking (CVE-2014-0482)
* Issue: data leakage via querystring manipulation in admin (CVE-2014-0483)
|
2014-06-10 14:01:56 by Joerg Sonnenberger | Files touched by this commit (1) |
Log message:
Use MASTER_SITES logic from www/py-django.
|