Revisions of obs-server
Hendrik Vogelsang (hennevogel)
accepted
request 967843
from
Daniel Donisa (danidoni)
(revision 81)
Drop git protocol usage in spec file. See https://github.blog/2021-09-01-improving-git-protocol-security-github/
Eduardo Navarro (enavarro_suse)
committed
(revision 80)
trigger service run
Eduardo Navarro (enavarro_suse)
committed
(revision 79)
Revert "take latest tag as version in service". - Update to version 2.10.12: Bugfixes ======== * Frontend: - CVE-2022-23633: Possible exposure of information vulnerability in Action Pack - Allow kiwi versions not strictly x.y.z scheme
Frank Schreiner (M0ses)
committed
(revision 78)
trigger service run
Frank Schreiner (M0ses)
committed
(revision 77)
fix version
Frank Schreiner (M0ses)
committed
(revision 76)
take latest tag as version in service
Hendrik Vogelsang (hennevogel)
committed
(revision 75)
trigger service run
Frank Schreiner (M0ses)
committed
(revision 74)
trigger service run
Frank Schreiner (M0ses)
committed
(revision 73)
set revision to origin/2.10 make sure that branch 2.10 is used not tag 2.10
Hendrik Vogelsang (hennevogel)
committed
(revision 72)
trigger service run
Frank Schreiner (M0ses)
committed
(revision 71)
trigger service run
Hendrik Vogelsang (hennevogel)
committed
(revision 70)
trigger service run
Frank Schreiner (M0ses)
committed
(revision 69)
trigger service run
Frank Schreiner (M0ses)
committed
(revision 68)
trigger service run
Frank Schreiner (M0ses)
committed
(revision 67)
trigger service run
Frank Schreiner (M0ses)
committed
(revision 66)
trigger service run
Adrian Schröter (adrianSuSE)
committed
(revision 65)
trigger service run
Dany Marcoux (dmarcoux)
committed
(revision 64)
trigger service run
Hendrik Vogelsang (hennevogel)
committed
(revision 63)
trigger service run
Hendrik Vogelsang (hennevogel)
committed
(revision 62)
- Update to version 2.10.10 Bugfixes ======== * frontend: - CVE-2020-15169: Potential XSS vulnerability in Action View - CVE-2020-8184: Percent-encoded cookies can be used to overwrite existing prefixed cookie names - GHSA-g6wq-qcwm-j5g2: ReDoS vulnerability in Sec-WebSocket-Extensions parser - GHSA-vr8q-g5c7-m54m: Nokogiri::XML::Schema trusts input by default, exposing risk of an XXE vulnerability
Displaying revisions 41 - 60 of 121