d99062f1d5
* passwordauth: prevent authentication bypass via multiple name parameters (CVE-2017-0356, OVE-20170111-0001) * passwordauth: avoid userinfo forgery via repeated email parameter (also in the scope of CVE-2017-0356) * CGI, attachment, passwordauth: harden against repeated parameters (not believed to have been a vulnerability) * remove: make it clearer that repeated page parameter is OK here * t/passwordauth.t: new automated test for passwordauth
6 lines
430 B
Text
6 lines
430 B
Text
$NetBSD: distinfo,v 1.120 2017/01/12 00:44:15 schmonz Exp $
|
|
|
|
SHA1 (ikiwiki_3.20170111.tar.xz) = c6df014617d3ac5e6c57eb573f02cc4cf71e9b7b
|
|
RMD160 (ikiwiki_3.20170111.tar.xz) = a15bdf28eb6f1c857b8faccc2fba368892b0d597
|
|
SHA512 (ikiwiki_3.20170111.tar.xz) = 78c2a624684bb1c34878ff008558a3967f6e7f5648878e931961695e582a40e4351b6e467c64ca42ba99cb403fd275265bd5d96ecd860ad8263043514d207ad4
|
|
Size (ikiwiki_3.20170111.tar.xz) = 2614240 bytes
|