Next | Query returned 52 messages, browsing 21 to 30 | Previous

History of commit frequency

CVS Commit History:


   2013-05-31 14:42:58 by Thomas Klausner | Files touched by this commit (2880)
Log message:
Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
   2012-10-28 07:31:10 by Aleksej Saushev | Files touched by this commit (600)
Log message:
Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.
   2012-10-03 23:59:10 by Thomas Klausner | Files touched by this commit (2798)
Log message:
Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
   2012-01-18 15:49:19 by Adam Ciarcinski | Files touched by this commit (1)
Log message:
Revbump after updating db5
   2010-09-16 10:06:18 by Adam Ciarcinski | Files touched by this commit (27)
Log message:
Revbump after updating databases/db5
   2010-06-02 15:11:54 by Adam Ciarcinski | Files touched by this commit (1) | Package updated
Log message:
Fix building with db5; updated to patch-20091019
   2010-06-02 15:11:00 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
Fix building with db5; updated to patch-20091019
   2010-02-26 11:28:35 by Thomas Klausner | Files touched by this commit (59)
Log message:
Reset maintainer for developers who gave back their commit bit.
   2010-02-19 22:10:25 by Joerg Sonnenberger | Files touched by this commit (1)
Log message:
Fix ownership. Bump revision.
   2009-10-17 03:50:39 by Takahiro Kambe | Files touched by this commit (2)
Log message:
Add official patch-20091015, quote from Readme.Patch-20091015.

Bump PKGREVISION.

Introduction:
=============

This patch fixes one buffer overflow problem in sgLog.c when overlong URLs
are requested. SquidGuard will then go into emergency mode were no blocking
occurs. This is not required in this situation.
The URLs must be build with a overlong sequence of slashes (/).

ATTENTION:  While squidGuard will no longer go into emergeny mode when one
overlong URL is passed to it, it is possible to use the overlong URL to
bypass the filter. This vulnerability is not fixed by this patch!
You can check if this vulnerability is actually exploited on your system
by checking the logfile squidGuard.log for the following warning (provided
you have not used the option --with-nolog=yes with configure before compiling
squidguard):

Warning: Possible bypass attempt. Found multiple slashes where only one is expected:

Next | Query returned 52 messages, browsing 21 to 30 | Previous