| Commit message (Collapse) | Author | Files | Lines |
|
(debian/patches/*.patch except 010_upstream.patch are merged)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
(closes: #771003, #766550, #403634, #380560, #345084, #285251, #268211)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- Use SSL_OP_NO_COMPRESSION if available due to the "CRIME attack".
[CVE-2012-4929]
- Use SSL_MODE_RELEASE_BUFFERS if available.
|
|
|
|
|
|
|
|
Bug: https://sourceforge.net/p/w3m/patches/66/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Patch from [w3m-dev 04464] on 2012-06-27, provided by AIDA Shinra.
|
|
Patch from [w3m-dev 04466] on 2012-07-15, provided by Hayaki Saito.
|
|
- debian/patches/010_entity-h-clean.patch: Updated
- debian/patches/050_entity-h-clean.patch: Removed (meged upstream)
|
|
Patch from <http://bugs.debian.org/615843> provided by Hilko Bengen.
|
|
Patch from <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665491>
provided by Simon Ruderich.
|