Waitress WSGI server
No description set
- Developed at devel:languages:python
- Sources inherited from project openSUSE:Factory
-
11
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:RebuildFactoryCandidates/python-waitress && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_multibuild | 0000000052 52 Bytes | |
fetch-intersphinx-inventories.sh | 0000000070 70 Bytes | |
python-waitress.changes | 0000024697 24.1 KB | |
python-waitress.spec | 0000003994 3.9 KB | |
python3.inv | 0000107005 104 KB | |
waitress-3.0.1.tar.gz | 0000180560 176 KB |
Latest Revision
Dominique Leuenberger (dimstar_suse)
accepted
request 1219322
from
Daniel Garcia (dgarcia)
(revision 33)
- Update to 3.0.1 (bsc#1232554, bsc#1232556, CVE-2024-49769, CVE-2024-49768): * Fix a bug that would lead to Waitress busy looping on select() on a half-open socket due to a race condition that existed when creating a new HTTPChannel. See https://github.com/Pylons/waitress/pull/435, https://github.com/Pylons/waitress/issues/418 and https://github.com/Pylons/waitress/security/advisories/GHSA-3f84-rpwh-47g6 * No longer strip the header values before passing them to the WSGI environ. See https://github.com/Pylons/waitress/pull/434 and https://github.com/Pylons/waitress/issues/432 * Fix a race condition in Waitress when `channel_request_lookahead` is enabled that could lead to HTTP request smuggling. * See https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
Comments 0