summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--CHANGELOG.md17
-rw-r--r--changelog.d/c2s-update-authorization.security1
-rw-r--r--changelog.d/content-type-sanitize.security1
-rw-r--r--changelog.d/cross-domain-redirect-check.security1
-rw-r--r--changelog.d/debian-distro-docs-pleromaBE.fix1
-rw-r--r--changelog.d/emoji-shortcode-validation.security1
-rw-r--r--changelog.d/local-fetch-prevention.security1
-rw-r--r--changelog.d/media-proxy-sanitize.security1
-rw-r--r--changelog.d/object-fetcher-content-type.security1
-rw-r--r--changelog.d/pl-fe.change1
10 files changed, 17 insertions, 9 deletions
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 657422689..19b87f09a 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -4,6 +4,23 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
+## 2.9.1
+
+### Security
+- Fix authorization checks for C2S Update activities to prevent unauthorized modifications of other users' content.
+- Fix content-type spoofing vulnerability that could allow users to upload ActivityPub objects as attachments
+- Reject cross-domain redirects when fetching ActivityPub objects to prevent bypassing domain-based security controls.
+- Limit emoji shortcodes to alphanumeric, dash, or underscore characters to prevent potential abuse.
+- Block attempts to fetch activities from the local instance to prevent spoofing.
+- Sanitize Content-Type headers in media proxy to prevent serving malicious ActivityPub content through proxied media.
+- Validate Content-Type headers when fetching remote ActivityPub objects to prevent spoofing attacks.
+
+### Changed
+- Include `pl-fe` in available frontends
+
+### Fixed
+- Remove trailing ` from end of line 75 which caused issues copy-pasting
+
## 2.9.0
### Security
diff --git a/changelog.d/c2s-update-authorization.security b/changelog.d/c2s-update-authorization.security
deleted file mode 100644
index 0fe7d97c9..000000000
--- a/changelog.d/c2s-update-authorization.security
+++ /dev/null
@@ -1 +0,0 @@
-Fix authorization checks for C2S Update activities to prevent unauthorized modifications of other users' content. \ No newline at end of file
diff --git a/changelog.d/content-type-sanitize.security b/changelog.d/content-type-sanitize.security
deleted file mode 100644
index a70b49f35..000000000
--- a/changelog.d/content-type-sanitize.security
+++ /dev/null
@@ -1 +0,0 @@
-Fix content-type spoofing vulnerability that could allow users to upload ActivityPub objects as attachments \ No newline at end of file
diff --git a/changelog.d/cross-domain-redirect-check.security b/changelog.d/cross-domain-redirect-check.security
deleted file mode 100644
index 9201de794..000000000
--- a/changelog.d/cross-domain-redirect-check.security
+++ /dev/null
@@ -1 +0,0 @@
-Reject cross-domain redirects when fetching ActivityPub objects to prevent bypassing domain-based security controls. \ No newline at end of file
diff --git a/changelog.d/debian-distro-docs-pleromaBE.fix b/changelog.d/debian-distro-docs-pleromaBE.fix
deleted file mode 100644
index d43477ba9..000000000
--- a/changelog.d/debian-distro-docs-pleromaBE.fix
+++ /dev/null
@@ -1 +0,0 @@
-Remove trailing ` from end of line 75 which caused issues copy-pasting \ No newline at end of file
diff --git a/changelog.d/emoji-shortcode-validation.security b/changelog.d/emoji-shortcode-validation.security
deleted file mode 100644
index 5a7d39279..000000000
--- a/changelog.d/emoji-shortcode-validation.security
+++ /dev/null
@@ -1 +0,0 @@
-Limit emoji shortcodes to alphanumeric, dash, or underscore characters to prevent potential abuse. \ No newline at end of file
diff --git a/changelog.d/local-fetch-prevention.security b/changelog.d/local-fetch-prevention.security
deleted file mode 100644
index e012abcd5..000000000
--- a/changelog.d/local-fetch-prevention.security
+++ /dev/null
@@ -1 +0,0 @@
-Block attempts to fetch activities from the local instance to prevent spoofing. \ No newline at end of file
diff --git a/changelog.d/media-proxy-sanitize.security b/changelog.d/media-proxy-sanitize.security
deleted file mode 100644
index b94348ea7..000000000
--- a/changelog.d/media-proxy-sanitize.security
+++ /dev/null
@@ -1 +0,0 @@
-Sanitize Content-Type headers in media proxy to prevent serving malicious ActivityPub content through proxied media. \ No newline at end of file
diff --git a/changelog.d/object-fetcher-content-type.security b/changelog.d/object-fetcher-content-type.security
deleted file mode 100644
index 2ef4aefe7..000000000
--- a/changelog.d/object-fetcher-content-type.security
+++ /dev/null
@@ -1 +0,0 @@
-Validate Content-Type headers when fetching remote ActivityPub objects to prevent spoofing attacks. \ No newline at end of file
diff --git a/changelog.d/pl-fe.change b/changelog.d/pl-fe.change
deleted file mode 100644
index 7e3e4b59e..000000000
--- a/changelog.d/pl-fe.change
+++ /dev/null
@@ -1 +0,0 @@
-Include `pl-fe` in available frontends