Age | Commit message (Collapse) | Author | Files | Lines |
|
www/firefox68-l10n: dependent update
Revisions pulled up:
- www/firefox68-l10n/Makefile 1.9
- www/firefox68-l10n/distinfo 1.7
---
Module Name: pkgsrc
Committed By: nia
Date: Thu Mar 12 19:54:45 UTC 2020
Modified Files:
pkgsrc/www/firefox68-l10n: Makefile distinfo
Log Message:
firefox68-l10n: Update to 68.6.0
Sync with firefox68
|
|
www/firefox68: security fix
Revisions pulled up:
- www/firefox68/Makefile 1.15
- www/firefox68/PLIST 1.5
- www/firefox68/distinfo 1.11
- www/firefox68/mozilla-common.mk 1.7
- www/firefox68/options.mk 1.8
- www/firefox68/patches/patch-aa 1.2
- www/firefox68/patches/patch-build_moz.configure_old.configure deleted
- www/firefox68/patches/patch-dom_media_CubebUtils.cpp 1.2
- www/firefox68/patches/patch-media_libcubeb_src_cubeb.c 1.2
- www/firefox68/patches/patch-media_libcubeb_src_cubeb__oss.c deleted
- www/firefox68/patches/patch-media_libcubeb_src_moz.build 1.2
- www/firefox68/patches/patch-media_libcubeb_update.sh 1.2
- www/firefox68/patches/patch-toolkit_library_moz.build 1.2
---
Module Name: pkgsrc
Committed By: nia
Date: Thu Mar 12 19:39:35 UTC 2020
Modified Files:
pkgsrc/www/firefox68: Makefile PLIST distinfo mozilla-common.mk
options.mk
pkgsrc/www/firefox68/patches: patch-aa patch-dom_media_CubebUtils.cpp
patch-media_libcubeb_src_cubeb.c patch-media_libcubeb_src_moz.build
patch-media_libcubeb_update.sh patch-toolkit_library_moz.build
Removed Files:
pkgsrc/www/firefox68/patches: patch-build_moz.configure_old.configure
patch-media_libcubeb_src_cubeb__oss.c
Log Message:
firefox68: Update to 68.6.0
While here,
- Remove OSS support now that cubeb_sun has been stable for a long while
- Appease pkglint
Security fixes in this release:
#CVE-2020-6805: Use-after-free when removing data about origins
#CVE-2020-6806: BodyStream::OnInputStreamReady was missing protections
#CVE-2020-6807: Use-after-free in cubeb during stream destruction
#CVE-2020-6811: Devtools' 'Copy as cURL' feature did not fully escape
#CVE-2019-20503: Out of bounds reads in sctp_load_addresses_from_init
#CVE-2020-6812: The names of AirPods with personally identifiable
#CVE-2020-6814: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
|
|
www/ruby-puma: security fix
Revisions pulled up:
- www/ruby-puma/Makefile 1.21-1.22
- www/ruby-puma/distinfo 1.16-1.17
---
Module Name: pkgsrc
Committed By: taca
Date: Sat Feb 29 02:19:55 UTC 2020
Modified Files:
pkgsrc/www/ruby-puma: Makefile distinfo
Log Message:
www/ruby-puma: update to 4.3.2
Update ruby-puma to 4.3.2.
## 4.3.2 and 3.12.3 / 2020-02-27
* Security
* Fix: Prevent HTTP Response splitting via CR/LF in header
values. CVE-2020-5247.
---
Module Name: pkgsrc
Committed By: taca
Date: Sun Mar 1 02:52:25 UTC 2020
Modified Files:
pkgsrc/www/ruby-puma: Makefile distinfo
Log Message:
www/ruby-puma: update to 4.3.3
Update ruby-puma to 4.3.3.
## 4.3.3 and 3.12.4 / 2020-02-28
* Bugfixes
* Fix: Fixes a problem where we weren't splitting headers correctly on newlines (#2132)
* Security
* Fix: Prevent HTTP Response splitting via CR in early hints.
|
|
www/wordpress: security fix
Revisions pulled up:
- www/wordpress/Makefile 1.91
- www/wordpress/PLIST 1.42
- www/wordpress/distinfo 1.73
---
Module Name: pkgsrc
Committed By: morr
Date: Sun Feb 23 09:59:42 UTC 2020
Modified Files:
pkgsrc/www/wordpress: Makefile PLIST distinfo
Log Message:
Update to version 5.3.2.
Changes:
Version 5.3.2:
Maintenance updates
- Date/Time: Ensure that get_feed_build_date() correctly handles a modified post object with invalid date.
- Uploads: Fix file name collision in wp_unique_filename() when uploading a file with upper case extension on non case-sensitive file systems.
- Media: Fix PHP warnings in wp_unique_filename() when the destination directory is unreadable.
- Administration: Fix the colors in all color schemes for buttons with the .active class.
- Tests/build tools: In wp_insert_post(), when checking the post date to set future or publish status, use a proper delta comparison.
Version 5.3.1:
Security fixes
- Props to Daniel Bachhuber for finding an issue where an unprivileged user could make a post sticky via the REST API.
- Props to Simon Scannell of RIPS Technologies for finding and disclosing an issue where cross-site scripting (XSS) could be stored in well-crafted links.
- Props to the WordPress.org Security Team for hardening wp_kses_bad_protocol() to ensure that it is aware of the named colon attribute.
- Props to Nguyen The Duc for discovering a stored XSS vulnerability using block editor content.
Maintenance updates
- Administration: improvements to admin form controls height and alignment standardization (see related dev note), dashboard widget links accessibility and alternate color scheme readability issues (see related dev note).
- Block editor: fix Edge scrolling issues and intermittent JavaScript issues.
- Bundled themes: add customizer option to show/hide author bio, replace JS based smooth scroll with CSS (see related dev note) and fix Instagram embed CSS.
- Date/time: improve non-GMT dates calculation, fix date format output in specific languages and make get_permalink() more resilient against PHP timezone changes.
- Embeds: remove CollegeHumor oEmbed provider as the service doesn’t exist anymore.
- External libraries: update sodium_compat.
- Site health: allow the remind interval for the admin email verification to be filtered.
- Uploads: avoid thumbnails overwriting other uploads when filename matches, and exclude PNG images from scaling after upload.
- Users: ensure administration email verification uses the user’s locale instead of the site locale.
|
|
www/firefox68-l10n: dependent update
Revisions pulled up:
- www/firefox68-l10n/Makefile 1.7
- www/firefox68-l10n/distinfo 1.6
---
Module Name: pkgsrc
Committed By: nia
Date: Sat Feb 15 12:55:12 UTC 2020
Modified Files:
pkgsrc/www/firefox68-l10n: Makefile distinfo
Log Message:
firefox68-l10n: Update to 68.5.0
Sync with firefox68.
|
|
www/firefox68: security fix
Revisions pulled up:
- www/firefox68/Makefile 1.12
- www/firefox68/PLIST 1.4
- www/firefox68/distinfo 1.10
---
Module Name: pkgsrc
Committed By: nia
Date: Sat Feb 15 12:48:22 UTC 2020
Modified Files:
pkgsrc/www/firefox68: Makefile PLIST distinfo
Log Message:
firefox68: Update to 68.5.0
Security Vulnerabilities fixed in Firefox ESR68.5
# CVE-2020-6796: Missing bounds check on shared memory read in the parent process
# CVE-2020-6797: Extensions granted downloads.open permission could open arbitrary applications on Mac OSX
# CVE-2020-6798: Incorrect parsing of template tag could result in JavaScript injection
# CVE-2020-6799: Arbitrary code execution when opening pdf links from other applications, when Firefox is configured as default pdf reader
Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected.
# CVE-2020-6800: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
|
|
www/py-feedgen: security fix
Revisions pulled up:
- www/py-feedgen/Makefile 1.3
- www/py-feedgen/PLIST 1.2
- www/py-feedgen/distinfo 1.2
---
Module Name: pkgsrc
Committed By: minskim
Date: Tue Feb 4 00:18:02 UTC 2020
Modified Files:
pkgsrc/www/py-feedgen: Makefile PLIST distinfo
Log Message:
www/py-feedgen: Update to 0.9.0
This version fixes a DoS vulnerability (CVE-2020-5227).
|
|
www/awstats: security fix
Revisions pulled up:
- www/awstats/Makefile 1.64
- www/awstats/distinfo 1.38
- www/awstats/patches/patch-aa deleted
- www/awstats/patches/patch-ab deleted
- www/awstats/patches/patch-ad deleted
- www/awstats/patches/patch-tools_awstats__configure.pl 1.1
- www/awstats/patches/patch-wwwroot_cgi-bin_awstats.pl 1.1
- www/awstats/patches/patch-wwwroot_cgi-bin_lib_search__engines.pm 1.1
---
Module Name: pkgsrc
Committed By: adam
Date: Tue Jan 7 18:21:02 UTC 2020
Modified Files:
pkgsrc/www/awstats: Makefile distinfo
Added Files:
pkgsrc/www/awstats/patches: patch-tools_awstats__configure.pl
patch-wwwroot_cgi-bin_awstats.pl
patch-wwwroot_cgi-bin_lib_search__engines.pm
Removed Files:
pkgsrc/www/awstats/patches: patch-aa patch-ab patch-ad
Log Message:
awstats: updated to 7.7
7.7:
Security fix: CVE-2017-1000501
Security fix: Missing sanitizing of parameters
Fix LogFormat=4 with url containing spaces.
Fix to window.opener vulnerability in external referral site links.
Add methodurlprot in key to define log format.
Add Dynamic DNS Lookup.
Fix edge support.
|
|
www/nginx: security fix
Revisions pulled up:
- www/nginx/Makefile 1.87
- www/nginx/distinfo 1.71-1.72
- www/nginx/patches/patch-src_http_ngx__http__special__response.c 1.1-1.2
---
Module Name: pkgsrc
Committed By: kim
Date: Sun Jan 19 07:28:36 UTC 2020
Modified Files:
pkgsrc/www/nginx: Makefile distinfo
Added Files:
pkgsrc/www/nginx/patches: patch-src_http_ngx__http__special__response.c
Log Message:
Add patch from upstream to address CVE-2019-20372. Bump revision.
---
Module Name: pkgsrc
Committed By: kim
Date: Sun Jan 19 07:42:42 UTC 2020
Modified Files:
pkgsrc/www/nginx: distinfo
pkgsrc/www/nginx/patches: patch-src_http_ngx__http__special__response.c
Log Message:
Mention CVE-2019-20372 in the patch file as well.
|
|
www/firefox68-l10n: dependent update
Revisions pulled up:
- www/firefox68-l10n/Makefile 1.5
- www/firefox68-l10n/distinfo 1.4
---
Module Name: pkgsrc
Committed By: ryoon
Date: Sat Jan 11 02:40:53 UTC 2020
Modified Files:
pkgsrc/www/firefox68-l10n: Makefile distinfo
Log Message:
firefox68-l10n: Update to 68.4.1
* Sync with www/firefox68-l10n.
|
|
www/firefox68: security fix (zero-day)
Revisions pulled up:
- www/firefox68/Makefile 1.7-1.8
- www/firefox68/distinfo 1.6-1.7
- www/firefox68/patches/patch-rust-1.39.0 deleted
---
Module Name: pkgsrc
Committed By: nia
Date: Wed Jan 8 21:49:32 UTC 2020
Modified Files:
pkgsrc/www/firefox68: Makefile distinfo
Removed Files:
pkgsrc/www/firefox68/patches: patch-rust-1.39.0
Log Message:
firefox68: Update to 68.4.0
Security Vulnerabilities fixed in Firefox ESR 68.4:
# CVE-2019-17015: Memory corruption in parent process during new content process initialization on Windows
# CVE-2019-17016: Bypass of @namespace CSS sanitization during pasting
# CVE-2019-17017: Type Confusion in XPCVariant.cpp
# CVE-2019-17021: Heap address disclosure in parent process during content process initialization on Windows
# CVE-2019-17022: CSS sanitization does not escape HTML tags
# CVE-2019-17024: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
---
Module Name: pkgsrc
Committed By: nia
Date: Thu Jan 9 20:51:59 UTC 2020
Modified Files:
pkgsrc/www/firefox68: Makefile distinfo
Log Message:
firefox68: Update to 68.4.1
This release fixes one zero-day vulnerability:
CVE-2019-17026: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion.
We are aware of targeted attacks in the wild abusing this flaw
|
|
* Sync with www/firefox68-68.3.0
|
|
* Sync with www/firefox60-60.9.0
|
|
* Fix build with rust-1.39.0
Changelog:
#CVE-2019-11746: Use-after-free while manipulating video
#CVE-2019-11744: XSS by breaking out of title and textarea elements using innerHTML
#CVE-2019-11742: Same-origin policy violation with SVG filters and canvas to steal cross-origin images
#CVE-2019-11753: Privilege escalation with Mozilla Maintenance Service in custom Firefox installation location
#CVE-2019-11752: Use-after-free while extracting a key value in IndexedDB
#CVE-2019-9812: Sandbox escape through Firefox Sync
#CVE-2019-11743: Cross-origin access to unload event attributes
#CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9
|
|
Accept ruby25 and ruby26 but not ruby24 any more.
|
|
Relax dependency to sprockets-rails.
Bump PKGREVISION.
|
|
recurse to reverse dependencies.
|
|
|
|
it.
|
|
|
|
|
|
firefox68 tries to use pkg-build-options to find out if gtk3 was (or
will be) built with wayland, as that affects the PLIST. The current
code works for some and causes failures for others, including failures
of thunderbird. pkg-build-options insists on only being called from
bl3, but the use in Makefile (to manage PLIST changes) seems sensible.
This commit removes the use of pkg-build-options, resolving the build
issues on netbsd-8, and adds a default-off wayland option to firefox68
that merely adjusts the PLIST, so that people building firefox68 with
a wayland-enabled gtk3 have an easier time.
I don't believe that any default-option binary packages will change,
so no PKGREVISION++.
A proper fix is deferred until after the branch. This could involve
allowing pkg-build-options to be used in Makefile* instead of only
bl3, or adding wayland detection and setting some variable to gtk3's
bl3.
As discussed on pkgsrc-users and offlist with nia@.
|
|
The buffer package specifies a canonical import path, but elsewhere in
the code of the package, it is imported with a different path (containing
/v2/). This has been broken since Go 1.12.
|
|
|
|
|
|
|
|
|
|
|
|
Django 2.2.9 fixes a security issue and a data loss bug in 2.2.8.
CVE-2019-19844: Potential account hijack via password reset form
By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account.
In order to avoid this vulnerability, password reset requests now compare the submitted email using the stricter, recommended algorithm for case-insensitive comparison of two identifiers from Unicode Technical Report 36, section 2.11.2(B)(2). Upon a match, the email containing the reset token will be sent to the email address on record rather than the submitted address.
Bugfixes
* Fixed a data loss possibility in SplitArrayField. When using with ArrayField(BooleanField()), all values after the first True value were marked as checked instead of preserving passed values
|
|
Django 1.11.27 fixes a security issue and a data loss bug in 1.11.26.
CVE-2019-19844: Potential account hijack via password reset form
By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account.
In order to avoid this vulnerability, password reset requests now compare the submitted email using the stricter, recommended algorithm for case-insensitive comparison of two identifiers from Unicode Technical Report 36, section 2.11.2(B)(2). Upon a match, the email containing the reset token will be sent to the email address on record rather than the submitted address.
Bugfixes
* Fixed a data loss possibility in SplitArrayField. When using with ArrayField(BooleanField()), all values after the first True value were marked as checked instead of preserving passed values
|
|
Update durpal8 to 8.7.11, security release.
8.7.11 (2019-12-18)
Release notes
Maintenance and security release of the Drupal 8 series.
This release fixes security vulnerabilities. Sites are urged to upgrade
immediately after reading the notes below and the security announcement.
|
|
Update drupal7 to 7.69, security release.
7.69 (2019-12-18)
Release notes
Maintenance and security release of the Drupal 7 series.
This release fixes security vulnerabilities. Sites are urged to upgrade
immediately after reading the notes below and the security announcement.
|
|
|
|
|
|
|
|
(No `c' compiler is needed to build this module.)
|
|
|
|
This module allows you to get the public suffix, as well as the
registrable domain, of a domain name using the Public Suffix List from
http://publicsuffix.org
|
|
a patch caused crashes, use suggestions by upstream that makes it more portable
|
|
## 4.3.1 and 3.12.2 / 2019-12-05
* Security
* Fix: a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. CVE-2019-16770.
## 4.3.0 / 2019-11-07
* Features
* Strip whitespace at end of HTTP headers (#2010)
* Optimize HTTP parser for JRuby (#2012)
* Add SSL support for the control app and cli (#2046, #2052)
* Bugfixes
* Fix Errno::EINVAL when SSL is enabled and browser rejects cert (#1564)
* Fix pumactl defaulting puma to development if an environment was not specified (#2035)
* Fix closing file stream when reading pid from pidfile (#2048)
* Fix a typo in configuration option `--extra_runtime_dependencies` (#2050)
## 4.2.1 / 2019-10-07
* 3 bugfixes
* Fix socket activation of systemd (pre-existing) unix binder files (#1842, #1988)
* Deal with multiple calls to bind correctly (#1986, #1994, #2006)
* Accepts symbols for `verify_mode` (#1222)
## 4.2.0 / 2019-09-23
* 6 features
* Pumactl has a new -e environment option and reads `config/puma/<environment>.rb` config files (#1885)
* Semicolons are now allowed in URL paths (MRI only), useful for Angular or Redmine (#1934)
* Allow extra dependencies to be defined when using prune_bundler (#1105)
* Puma now reports the correct port when binding to port 0, also reports other listeners when binding to localhost (#1786)
* Sending SIGINFO to any Puma worker now prints currently active threads and their backtraces (#1320)
* Puma threads all now have their name set on Ruby 2.3+ (#1968)
* 4 bugfixes
* Fix some misbehavior with phased restart and externally SIGTERMed workers (#1908, #1952)
* Fix socket closing on error (#1941)
* Removed unnecessary SIGINT trap for JRuby that caused some race conditions (#1961)
* Fix socket files being left around after process stopped (#1970)
* Absolutely thousands of lines of test improvements and fixes thanks to @MSP-Greg
## 4.1.1 / 2019-09-05
* 3 bugfixes
* Revert our attempt to not dup STDOUT/STDERR (#1946)
* Fix socket close on error (#1941)
* Fix workers not shutting down correctly (#1908)
## 4.1.0 / 2019-08-08
* 4 features
* Add REQUEST_PATH on parse error message (#1831)
* You can now easily add custom log formatters with the `log_formatter` config option (#1816)
* Puma.stats now provides process start times (#1844)
* Add support for disabling TLSv1.1 (#1836)
* 7 bugfixes
* Fix issue where Puma was creating zombie process entries (#1887)
* Fix bugs with line-endings and chunked encoding (#1812)
* RACK_URL_SCHEME is now set correctly in all conditions (#1491)
* We no longer mutate global STDOUT/STDERR, particularly the sync setting (#1837)
* SSL read_nonblock no longer blocks (#1857)
* Swallow connection errors when sending early hints (#1822)
* Backtrace no longer dumped when invalid pumactl commands are run (#1863)
* 5 other
* Avoid casting worker_timeout twice (#1838)
* Removed a call to private that wasn't doing anything (#1882)
* README, Rakefile, docs and test cleanups (#1848, #1847, #1846, #1853, #1859, #1850, #1866, #1870, #1872, #1833, #1888)
* Puma.io has proper documentation now (https://puma.io/puma/)
* Added the Contributor Covenant CoC
* 1 known issue
* Some users are still experiencing issues surrounding socket activation and Unix sockets (#1842)
## 4.0.1 / 2019-07-11
* 2 bugfixes
* Fix socket removed after reload - should fix problems with systemd socket activation. (#1829)
* Add extconf tests for DTLS_method & TLS_server_method, use in minissl.rb. Should fix "undefined symbol: DTLS_method" when compiling against old OpenSSL versions. (#1832)
* Removed unnecessary RUBY_VERSION checks. (#1827)
## 4.0.0 / 2019-06-25
9 features
* Add support for disabling TLSv1.0 (#1562)
* Request body read time metric (#1569)
* Add out_of_band hook (#1648)
* Re-implement (native) IOBuffer for JRuby (#1691)
* Min worker timeout (#1716)
* Add option to suppress SignalException on SIGTERM (#1690)
* Allow mutual TLS CA to be set using `ssl_bind` DSL (#1689)
* Reactor now uses nio4r instead of `select` (#1728)
9 x bugfixes
* Do not accept new requests on shutdown (#1685, #1808)
* Fix 3 corner cases when request body is chunked (#1508)
* Change pid existence check's condition branches (#1650)
* Don't call .stop on a server that doesn't exist (#1655)
* Implemented NID_X9_62_prime256v1 (P-256) curve over P-521 (#1671)
* Fix @notify.close can't modify frozen IOError (RuntimeError) (#1583)
* Fix Java 8 support (#1773)
* Fix error `uninitialized constant Puma::Cluster` (#1731)
* Fix `not_token` being able to be set to true (#1803)
## 3.12.1 / 2019-01-08
* 1 features
* Internal strings are frozen (#1649)
* 3 bugfixes
* Fix chunked ending check (#1607)
* Rack handler should use provided default host (#1700)
* Better support for detecting runtimes that support `fork` (#1630)
|
|
Update php-ja-wordpress from 4.5.3 to 5.3.1.
This release contains these security fixes.
* Props to Daniel Bachhuber for finding an issue where an unprivileged
user could make a post sticky via the REST API.
* Props to Simon Scannell of RIPS Technologies for finding and
disclosing an issue where cross-site scripting (XSS) could be stored
in well-crafted links.
* Props to the WordPress.org Security Team for hardening
wp_kses_bad_protocol() to ensure that it is aware of the named colon
attribute.
* Props to Nguyen The Duc for discovering a stored XSS vulnerability
using block editor content.
For more detail about version 5.3.1, please refer
<https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/>
And changes from 4.5.3 to 5.3.0, please refer HOMEPAGE and
<https://wordpress.org/>.
|
|
Drop php71 support mechanically.
|
|
Changelog:
Sun 15 Dec 2019 02:12:02 PM CET
Fix send() call (affects Mac OS X). #5977 -CG/fbrault
Releasing libmicrohttpd 0.9.69. -CG
Fri 29 Nov 2019 11:22:25 PM CET
If application suspends a connection before we could send 100 CONTINUE,
give application another shot at queuing a reply before the upload begins. -CG
|
|
1.1.3:
- URL-friendly parameter encoding
- Updating dependency reference for Python 3 compatibility
- Include database views in list of tables
- Fix unicode issue when generating migration with py2 or py3
- Do not use "message" attribute on exception
- Update EXPLORER_SCHEMA_EXCLUDE_TABLE_PREFIXES
- Minor Changes
- release checklist included in repo
- readme updated with new screenshots
- python dependencies/optional-dependencies updated to latest
- six, xlsxwriter, factory-boy, sqlparse
|
|
Version 2.2:
Added DjangoFilterBackend.get_schema_operation_parameters() for DRF 3.10+ OpenAPI schema generation.
Added lookup_expr to MultipleChoiceFilter
Dropped support for EOL Python 3.4
|
|
Django REST framework 3.11
The 3.11 release adds support for Django 3.0.
Our supported Python versions are now: 3.5, 3.6, 3.7, and 3.8.
Our supported Django versions are now: 1.11, 2.0, 2.1, 2.2, and 3.0.
This release will be the last to support Python 3.5 or Django 1.11.
* OpenAPI Schema Generation Improvements
* Validator / Default Context
|
|
3.2.0:
Converted setuptools metadata to configuration file. This meant removing the __version__ attribute from the package. If you want to inspect the installed version, use importlib.metadata.version("django-cors-headers") (docs / backport).
Support Python 3.8.
|
|
Now PHP 7 and later are supported.
Changes are too many to write here, please refer readme.txt in detail.
|
|
typo3_62 package only supports php56.
|
|
Explicitly specify supporting versions of PHP.
|