|
Number of commits found: 2
| Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
| This is a slave port. You may also want to view the commits to the master port: www/angie | | Commit | Credits | Log message |
2.3.0_3,1 08 Feb 2026 13:57:53
    |
Vladimir Druzenko (vvd)  Author: Sebastian Oswald |
www/angie: Update 1.11.2 => 1.11.3 (fix CVE-2026-1642, possible MITM attack)
Security: An attacker in a man-in-the-middle (MITM) position before a
proxied server using TLS, given conditions beyond the attacker's
control, could inject plaintext data into the response before the TLS
handshake begins (CVE-2026-1642); the fix was ported from nginx 1.29.5.
Changelog:
https://en.angie.software/angie/docs/oss_changes/#angie-1-11-3
- Bump PORTREVISION in www/angie-module-*.
- Fix using of ANGIE_PORTREVISION in RUN_DEPENDS for modules.
- Replace INSTALL_MAN with INSTALL_DATA for documentation.
- Unroll "for" loops with 1-2 items - simplify Makefile and call
"INSTALL_*" 1 time instead of several.
PR: 293034
Security: CVE-2026-1642
MFH: 2026Q1
(cherry picked from commit 8622849d0c2ee6d2e534f2bd12d8c6d603799f12) |
2.3.0_2,1 08 Feb 2026 13:57:21
    |
Vladimir Druzenko (vvd)  Author: Sebastian Oswald |
www/angie*: Bump PORTREVISION after www/angie update
pkg does not honor RUN_DEPENDS versions, hence it fails to re-install
module packages after updates to www/angie. The only workaround is
bumping PORTREVISION for *all* modules.
PR: 292648
(cherry picked from commit 8d40b7a5a4a168f1594633d1a747f089e572b66a) |
Number of commits found: 2
|