Package: cgit / 0.10.2.git2.0.1-3+deb8u1
Metadata
| Package | Version | Patches format |
|---|---|---|
| cgit | 0.10.2.git2.0.1-3+deb8u1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| debianize_makefile | (download) |
Makefile |
4 2 + 2 - 0 ! |
--- |
| fix_status_code_for_unknown_repos | (download) |
tests/t0112-no-repo-found.sh |
12 12 + 0 - 0 ! |
return a proper status code when there is no repository found |
| hardening | (download) |
cgit.conf |
6 6 + 0 - 0 ! |
add hardening Add hardening to cgit. |
| ui blob Do not accept mimetype from user.patch | (download) |
cgit.c |
2 0 + 2 - 0 ! |
[patch] ui-blob: do not accept mimetype from user |
| ui shared prevent malicious filename from injecting .patch | (download) |
html.c |
26 26 + 0 - 0 ! |
[patch] ui-shared: prevent malicious filename from injecting headers |
| filter avoid integer overflow in authenticate_post.patch | (download) |
cgit.c |
2 1 + 1 - 0 ! |
[patch] filter: avoid integer overflow in authenticate_post ctx.env.content_length is an unsigned int, coming from the CONTENT_LENGTH environment variable, which is parsed by strtoul. The HTTP/1.1 spec says that "any Content-Length greater than or equal to zero is a valid value." By storing this into an int, we potentially overflow it, resulting in the following bounding check failing, leading to a buffer overflow. Reported-by: Erik Cabetas <[email protected]> Signed-off-by: Jason A. Donenfeld <[email protected]> |
| filters apply HTML escaping.patch | (download) |
filters/html-converters/txt2html |
2 1 + 1 - 0 ! |
[patch] filters: apply html escaping http://www.w3.org/International/questions/qa-escapes#use |
