X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/6253567127aeff5dd50dac642e716e56142d2adc..afda05479645ccf64bc2cb534d023c5a8cb0a5ae:/debian/changelog diff --git a/debian/changelog b/debian/changelog index ea77c6e3d..92d1b5697 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,10 +1,119 @@ -ikiwiki (3.20160122) UNRELEASED; urgency=medium +ikiwiki (3.20161229.1) UNRELEASED; urgency=medium + + * git: Attribute reverts to the user doing the revert, not the wiki + itself. + + -- Simon McVittie Thu, 29 Dec 2016 20:35:51 +0000 + +ikiwiki (3.20161229) unstable; urgency=medium + + * Security: force CGI::FormBuilder->field to scalar context where + necessary, avoiding unintended function argument injection + analogous to CVE-2014-1572. In ikiwiki this could be used to + forge commit metadata, but thankfully nothing more serious. + (CVE-2016-9646) + * Security: try revert operations in a temporary working tree before + approving them. Previously, automatic rename detection could result in + a revert writing outside the wiki srcdir or altering a file that the + reverting user should not be able to alter, an authorization bypass. + (CVE-2016-10026 represents the original vulnerability.) + The incomplete fix released in 3.20161219 was not effective for git + versions prior to 2.8.0rc0. + (CVE-2016-9645 represents that incomplete solution.) + * Add CVE references for CVE-2016-10026 + * Add automated test for using the CGI with git, including + CVE-2016-10026 + - Build-depend on libipc-run-perl for better build-time test coverage + * Add missing ikiwiki.setup for the manual test for CVE-2016-10026 + * git: don't issue a warning if the rcsinfo CGI parameter is undefined + * git: do not fail to commit changes with a recent git version + and an anonymous committer + + -- Simon McVittie Thu, 29 Dec 2016 17:36:15 +0000 + +ikiwiki (3.20161219) unstable; urgency=medium + + [ Joey Hess ] + * inline: Prevent creating a file named ".mdwn" when the + postform is submitted with an empty title. + + [ Simon McVittie ] + * Security: tell `git revert` not to follow renames. If it does, then + renaming a file can result in a revert writing outside the wiki srcdir + or altering a file that the reverting user should not be able to alter, + an authorization bypass. Thanks, intrigeri. (CVE-2016-10026) + * cgitemplate: remove some dead code. Thanks, blipvert + * Restrict CSS matches against header class to not break + Pandoc tables with header rows. Thanks, karsk + * Make pagestats output more deterministic. Thanks, intrigeri + + -- Simon McVittie Mon, 19 Dec 2016 20:34:23 +0000 + +ikiwiki (3.20160905) unstable; urgency=medium + + [ Joey Hess ] + * Fix installation when prefix includes a string metacharacter. + Thanks, Sam Hathaway. + + [ Simon McVittie ] + * Use git log --no-renames to generate recentchanges, fixing the git + test-case with git 2.9 (Closes: #835612) + + -- Simon McVittie Mon, 05 Sep 2016 21:26:19 +0100 + +ikiwiki (3.20160728) unstable; urgency=medium + + * Explicitly remove current working directory from Perl's library + search path, mitigating CVE-2016-1238 (see #588017) + * wrappers: allocate new environment dynamically, so we won't overrun + the array if third-party plugins add multiple environment variables. + * Standards-Version: 3.9.8 (no changes required) + + -- Simon McVittie Thu, 28 Jul 2016 10:41:56 +0100 + +ikiwiki (3.20160509) unstable; urgency=high + + [ Amitai Schlair ] + * img: ignore the case of the extension when detecting image format, + fixing the regression that *.JPG etc. would not be displayed + since 3.20160506 [ Simon McVittie ] + * img: parse img_allowed_formats case-insensitively, as was done in + 3.20141016.3 + * inline: restore backwards compat for show=-1 syntax, which + worked before 3.20160121 + * Remove a spurious changelog entry from 3.20160506 (the relevant + change was already in 3.20150614) + * Add CVE-2016-4561 reference to 3.20160506 changelog + * Set high urgency to get the CVE-2016-4561 fix and CVE-2016-3714 + mitigation into testing + + -- Simon McVittie Mon, 09 May 2016 21:57:09 +0100 + +ikiwiki (3.20160506) unstable; urgency=medium + + [ Simon McVittie ] + * HTML-escape error messages, in one case avoiding potential cross-site + scripting (CVE-2016-4561, OVE-20160505-0012) + * Mitigate ImageMagick vulnerabilities such as CVE-2016-3714: + - img: force common Web formats to be interpreted according to extension, + so that "allowed_attachments: '*.jpg'" does what one might expect + - img: restrict to JPEG, PNG and GIF images by default, again mitigating + CVE-2016-3714 and similar vulnerabilities + - img: check that the magic number matches what we would expect from + the extension before giving common formats to ImageMagick * d/control: use https for Homepage * d/control: add Vcs-Browser [ Joey Hess ] + * img: Add back support for SVG images, bypassing ImageMagick and + simply passing the SVG through to the browser, which is supported by all + commonly used browsers these days. + SVG scaling by img directives has subtly changed; where before + size=wxh would preserve aspect ratio, this cannot be done when passing + them through and so specifying both a width and height can change + the SVG's aspect ratio. * loginselector: When only openid and emailauth are enabled, but passwordauth is not, avoid showing a "Other" box which opens an empty form. @@ -12,7 +121,10 @@ ikiwiki (3.20160122) UNRELEASED; urgency=medium [ Amitai Schlair ] * mdwn: Process .md like .mdwn, but disallow web creation. - -- Simon McVittie Thu, 21 Jan 2016 22:34:04 +0000 + [ Florian Wagner ] + * git: Correctly handle filenames starting with a dash in add/rm/mv. + + -- Simon McVittie Fri, 06 May 2016 07:54:26 +0100 ikiwiki (3.20160121) unstable; urgency=medium