X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/c7bdebaaf134729356852918b387071c92f85e72..7269c9af3e55dc478792d8ea010ab9b794190a66:/debian/changelog?ds=sidebyside diff --git a/debian/changelog b/debian/changelog index dc405232d..3327be340 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,42 @@ +ikiwiki (3.20160728) unstable; urgency=medium + + * Explicitly remove current working directory from Perl's library + search path, mitigating CVE-2016-1238 (see #588017) + * wrappers: allocate new environment dynamically, so we won't overrun + the array if third-party plugins add multiple environment variables. + * Standards-Version: 3.9.8 (no changes required) + + -- Simon McVittie Thu, 28 Jul 2016 10:41:56 +0100 + +ikiwiki (3.20160509~bpo8+1) jessie-backports; urgency=medium + + * Rebuild for jessie-backports + - debian/tests/control: set INSTALLED_TESTS=1 here, + pkg-perl-autopkgtest in jessie didn't support + debian/tests/pkg-perl/smoke-env + + -- Simon McVittie Mon, 09 May 2016 22:19:05 +0100 + +ikiwiki (3.20160509) unstable; urgency=high + + [ Amitai Schlair ] + * img: ignore the case of the extension when detecting image format, + fixing the regression that *.JPG etc. would not be displayed + since 3.20160506 + + [ Simon McVittie ] + * img: parse img_allowed_formats case-insensitively, as was done in + 3.20141016.3 + * inline: restore backwards compat for show=-1 syntax, which + worked before 3.20160121 + * Remove a spurious changelog entry from 3.20160506 (the relevant + change was already in 3.20150614) + * Add CVE-2016-4561 reference to 3.20160506 changelog + * Set high urgency to get the CVE-2016-4561 fix and CVE-2016-3714 + mitigation into testing + + -- Simon McVittie Mon, 09 May 2016 21:57:09 +0100 + ikiwiki (3.20160506~bpo8+1) jessie-backports; urgency=medium * Rebuild for jessie-backports @@ -9,10 +48,8 @@ ikiwiki (3.20160506~bpo8+1) jessie-backports; urgency=medium ikiwiki (3.20160506) unstable; urgency=medium [ Simon McVittie ] - * img: stop ImageMagick trying to be clever if filenames contain a colon, - avoiding mis-processing * HTML-escape error messages, in one case avoiding potential cross-site - scripting (OVE-20160505-0012) + scripting (CVE-2016-4561, OVE-20160505-0012) * Mitigate ImageMagick vulnerabilities such as CVE-2016-3714: - img: force common Web formats to be interpreted according to extension, so that "allowed_attachments: '*.jpg'" does what one might expect