| Commit message (Collapse) | Author | Files | Lines |
|
|
|
[CVE-2016-9442]
|
|
[CVE-2016-9425] [CVE-2016-9428]
|
|
|
|
|
|
|
|
[CVE-2016-9435] [CVE-2016-9436]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
[CVE-2016-9423] [CVE-2016-9431]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- Use SSL_OP_NO_COMPRESSION if available due to the "CRIME attack".
[CVE-2012-4929]
- Use SSL_MODE_RELEASE_BUFFERS if available.
|
|
|
|
|
|
|
|
Bug: https://sourceforge.net/p/w3m/patches/66/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Patch from [w3m-dev 04464] on 2012-06-27, provided by AIDA Shinra.
|
|
Patch from [w3m-dev 04466] on 2012-07-15, provided by Hayaki Saito.
|
|
- debian/patches/010_entity-h-clean.patch: Updated
- debian/patches/050_entity-h-clean.patch: Removed (meged upstream)
|
|
Patch from <http://bugs.debian.org/615843> provided by Hilko Bengen.
|