summaryrefslogtreecommitdiff
path: root/www
AgeCommit message (Collapse)AuthorFilesLines
2010-04-07Pullup ticket #3073 - requested by marttitron2-6/+6
mediawiki: security update Revisions pulled up: - www/mediawiki/Makefile 1.11 - www/mediawiki/distinfo 1.7 --- Module Name: pkgsrc Committed By: martti Date: Wed Apr 7 05:40:11 UTC 2010 Modified Files: pkgsrc/www/mediawiki: Makefile distinfo Log Message: Updated www/mediawiki to 1.15.3 This is a security and bugfix release of MediaWiki 1.15.3 and MediaWiki 1.16.0beta2. MediaWiki was found to be vulnerable to login CSRF. An attacker who controls a user account on the target wiki can force the victim to log in as the attacker, via a script on an external website. If the wiki is configured to allow user scripts, say with "$wgAllowUserJs = true" in LocalSettings.php, then the attacker can proceed to mount a phishing-style attack against the victim to obtain their password. Even without user scripting, this attack is a potential nuisance, and so all public wikis should be upgraded if possible. Our fix includes a breaking change to the API login action. Any clients using it will need to be updated. We apologise for making such a disruptive change in a minor release, but we feel that security is paramount. For more details see https://bugzilla.wikimedia.org/show_bug.cgi?id=23076
2010-03-28Pullup ticket #3068 - requested by tacatron6-63/+9
apache22: security update Revisions pulled up: - www/apache22/Makefile 1.56 - www/apache22/PLIST 1.16 - www/apache22/distinfo 1.30-1.31 - www/apache22/patches/patch-aq delete - www/apache22/patches/patch-as delete - www/apache22/patches/patch-au delete --- Module Name: pkgsrc Committed By: taca Date: Fri Mar 5 00:22:59 UTC 2010 Modified Files: pkgsrc/www/apache22: distinfo Removed Files: pkgsrc/www/apache22/patches: patch-aq patch-as patch-au Log Message: Remove CVE-2007-3304 related patches. CVE-2007-3304 was fixed in Apache 2.2.6 and these patches are noop. --- Module Name: pkgsrc Committed By: taca Date: Tue Mar 9 02:30:15 UTC 2010 Modified Files: pkgsrc/www/apache22: Makefile PLIST distinfo Log Message: Update apache22 package to 2.2.15. For full changes information please refer: http://www.apache.org/dist/httpd/Announcement2.2.html. Here is security related changes from ChangeLog (http://www.apache.org/dist/httpd/CHANGES_2.2.15). Changes with Apache 2.2.15 *) SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: A partial fix for the TLS renegotiation prefix injection attack by rejecting any client-initiated renegotiations. Forcibly disable keepalive for the connection if there is any buffered data readable. Any configuration which requires renegotiation for per-directory/location access control is still vulnerable, unless using OpenSSL >= 0.9.8l. [Joe Orton, Ruediger Pluem, Hartmut Keil <Hartmut.Keil adnovum.ch>] *) SECURITY: CVE-2010-0408 (cve.mitre.org) mod_proxy_ajp: Respond with HTTP_BAD_REQUEST when the body is not sent when request headers indicate a request body is incoming; not a case of HTTP_INTERNAL_SERVER_ERROR. [Niku Toivola <niku.toivola sulake.com>] *) SECURITY: CVE-2010-0425 (cve.mitre.org) mod_isapi: Do not unload an isapi .dll module until the request processing is completed, avoiding orphaned callback pointers. [Brett Gervasoni <brettg senseofsecurity.com>, Jeff Trawick]
2010-03-09Pullup ticket #3046 - requested by marttitron2-6/+6
mediawiki: security update Revisions pulled up: - www/mediawiki/Makefile 1.10 - www/mediawiki/distinfo 1.6 --- Module Name: pkgsrc Committed By: martti Date: Tue Mar 9 05:16:42 UTC 2010 Modified Files: pkgsrc/www/mediawiki: Makefile distinfo Log Message: Updated www/mediawiki to 1.15.2 Two security issues were discovered: A CSS validation issue was discovered which allows editors to display external images in wiki pages. This is a privacy concern on public wikis, since a malicious user may link to an image on a server they control, which would allow that attacker to gather IP addresses and other information from users of the public wiki. All sites running publicly-editable MediaWiki installations are advised to upgrade. All versions of MediaWiki (prior to this one) are affected. A data leakage vulnerability was discovered in thumb.php which affects wikis which restrict access to private files using img_auth.php, or some similar scheme. All versions of MediaWiki since 1.5 are affected. Deleting thumb.php is a suitable workaround for private wikis which do not use $wgThumbnailScriptPath or $wgLocalRepo['thumbScriptUrl']. Alternatively, you can upgrade to MediaWiki 1.15.2 or backport the patch below to whatever version of MediaWiki you are using.
2010-03-05Pullup ticket #3038 - requested by tacatron3-11/+8
drupal6: security update Revisions pulled up: - www/drupal6/Makefile 1.19 - www/drupal6/PLIST 1.6 - www/drupal6/distinfo 1.15 --- Module Name: pkgsrc Committed By: taca Date: Thu Mar 4 01:29:58 UTC 2010 Modified Files: pkgsrc/www/drupal6: Makefile PLIST distinfo Log Message: Update drupal6 package to 6.16. Drupal 6.16, 2010-03-03 ---------------------- - Fixed security issues (Installation cross site scripting, Open redirection, Locale module cross site scripting, Blocked user session regeneration), see SA-CORE-2010-001. - Better support for updated jQuery versions. - Reduced resource usage of update.module. - Fixed several issues relating to support of install profiles and distributions. - Added a locking framework to avoid data corruption on long operations. - Fixed a variety of other bugs.
2010-03-05Pullup ticket #3037 - requested tacatron2-14/+7
drupal: security update Revisions pulled up: - www/drupal/Makefile 1.44 - www/drupal/distinfo 1.34 --- Module Name: pkgsrc Committed By: taca Date: Thu Mar 4 01:29:39 UTC 2010 Modified Files: pkgsrc/www/drupal: Makefile distinfo Log Message: Update drupal package to 5.22. Drupal 5.22, 2010-03-03 ----------------------- - Fixed security issues (Open redirection, Locale module cross site scripting, Blocked user session regeneration), see SA-CORE-2010-001.
2010-03-04Pullup ticket #3036 - requested by tacatron1-2/+1
php5: security update php-bz2: security update php-zip: security update php-zlib: security update php-iconv: security update php-dba: security update php-dbase: security update php-dbx: security update php-ldap: security update php-mssql: security update php-mysql: security update php-odbc: security update php-pdo: security update php-pdo_dblib: security update php-pdo_mysql: security update php-pdo_pgsql: security update php-pdo_sqlite: security update php-pgsql: security update php-sqlite: security update php5-mysqli: security update php-gettext: security update php-gmp: security update php-memcache: security update php-pcntl: security update php-posix: security update php-shmop: security update php-sysvsem: security update php-sysvshm: security update php-exif: security update php-gd: security update php5-perl: security update php-imap: security update php-bcmath: security update php-calendar: security update php-mbstring: security update php-ming: security update php-ftp: security update php-snmp: security update php-sockets: security update php-xmlrpc: security update php-yaz: security update php5-soap: security update php-pdflib: security update php-mcrypt: security update php-mhash: security update php-suhosin: security update php-json: security update php-pspell: security update php-wddx: security update php5-dom: security update php5-xsl: security update php-apc: security update php-curl: security update php-eaccelerator: security update Revisions pulled up: - archivers/php-zlib/Makefile 1.14 - databases/php-dba/Makefile 1.12 - databases/php-ldap/Makefile 1.16 - databases/php-mssql/Makefile 1.12 - databases/php-pdo_dblib/Makefile 1.12 - databases/php-pdo_pgsql/Makefile 1.13 - databases/php-pgsql/Makefile 1.14 - graphics/php-exif/Makefile 1.8 - graphics/php-gd/Makefile 1.22 - lang/php5/Makefile 1.77-1.78 - lang/php5/Makefile.common 1.40 - lang/php5/Makefile.php 1.39-1.41 - lang/php5/distinfo 1.73,1.76 - mail/php-imap/Makefile 1.20 - net/php-ftp/Makefile 1.12 - print/php-pdflib/Makefile 1.13 - www/php-curl/Makefile 1.16 --- Module Name: pkgsrc Committed By: taca Date: Sat Feb 27 03:25:17 UTC 2010 Modified Files: pkgsrc/lang/php5: Makefile Makefile.common Makefile.php distinfo Log Message: Update php5 package to 5.2.13. 25 Feb 2010, PHP 5.2.13 - Updated timezone database to version 2010.2. (Derick) - Upgraded bundled PCRE to version 7.9. (Ilia) - Removed automatic file descriptor unlocking happening on shutdown and/or stream close (on all OSes excluding Windows). (Tony, Ilia) - Changed tidyNode class to disallow manual node creation. (Pierrick) - Added missing host validation for HTTP urls inside FILTER_VALIDATE_URL. (Ilia) - Improved LCG entropy. (Rasmus, Samy Kamkar) - Fixed safe_mode validation inside tempnam() when the directory path does not end with a /). (Martin Jansen) - Fixed a possible open_basedir/safe_mode bypass in session extension identified by Grzegorz Stachowiak. (Ilia) - Fixed bug in bundled libgd causing spurious horizontal lines drawn by gdImageFilledPolygon (libgd #100). (Takeshi Abe) - Fixed build of mysqli with MySQL 5.5.0-m2. (Andrey) - Fixed bug #50940 Custom content-length set incorrectly in Apache sapis. (Brian France, Rasmus) - Fixed bug #50930 (Wrong date by php_date.c patch with ancient gcc/glibc versions). (Derick) - Fixed bug #50859 (build fails with openssl 1.0 due to md2 deprecation). (Ilia, hanno at hboeck dot de) - Fixed bug #50847 (strip_tags() removes all tags greater then 1023 bytes long). (Ilia) - Fixed bug #50832 (HTTP fopen wrapper does not support passwordless HTTP authentication). (Jani) - Fixed bug #50823 (ReflectionFunction::isDeprecated producing "cannot be called statically" error). (Jani, Felipe) - Fixed bug #50791 (Compile failure: Bad logic in defining fopencookie emulation). (Jani) - Fixed bug #50787 (stream_set_write_buffer() has no effect on socket streams). (vnegrier at optilian dot com, Ilia) - Fixed bug #50772 (mysqli constructor without parameters does not return a working mysqli object). (Andrey) - Fixed bug #50761 (system.multiCall crashes in xmlrpc extension). (hiroaki dot kawai at gmail dot com, Ilia) - Fixed bug #50732 (exec() adds single byte twice to $output array). (Ilia) - Fixed bug #50728 (All PDOExceptions hardcode 'code' property to 0). (Joey, Ilia) - Fixed bug #50727 (Accessing mysqli->affected_rows on no connection causes segfault). (Andrey, Johannes) - Fixed bug #50680 (strtotime() does not support eighth ordinal number). (Ilia) - Fixed bug #50661 (DOMDocument::loadXML does not allow UTF-16). (Rob) - Fixed bug #50657 (copy() with an empty (zero-byte) HTTP source succeeds but returns false). (Ilia) - Fixed bug #50636 (MySQLi_Result sets values before calling constructor). (Pierrick) - Fixed bug #50632 (filter_input() does not return default value if the variable does not exist). (Ilia) - Fixed bug #50576 (XML_OPTION_SKIP_TAGSTART option has no effect). (Pierrick) - Fixed bug #50575 (PDO_PGSQL LOBs are not compatible with PostgreSQL 8.5). (Matteo) - Fixed bug #50558 (Broken object model when extending tidy). (Pierrick) - Fixed bug #50540 (Crash while running ldap_next_reference test cases). (Sriram) - Fixed bug #50508 (compile failure: Conflicting HEADER type declarations). (Jani) - Fixed bug #50394 (Reference argument converted to value in __call). (Stas) - Fixed bug #49851 (http wrapper breaks on 1024 char long headers). (Ilia) - Fixed bug #49600 (imageTTFText text shifted right). (Takeshi Abe) - Fixed bug #49585 (date_format buffer not long enough for >4 digit years). (Derick, Adam) - Fixed bug #49463 (setAttributeNS fails setting default namespace). (Rob) - Fixed bug #48667 (Implementing Iterator and IteratorAggregate). (Etienne) - Fixed bug #48590 (SoapClient does not honor max_redirects). (Sriram) - Fixed bug #48190 (Content-type parameter "boundary" is not case-insensitive in HTTP uploads). (Ilia) - Fixed bug #47601 (defined() requires class to exist when testing for class constants). (Ilia) - Fixed bug #47409 (extract() problem with array containing word "this"). (Ilia, chrisstocktonaz at gmail dot com) - Fixed bug #47002 (Field truncation when reading from dbase dbs with more then 1024 fields). (Ilia, sjoerd-php at linuxonly dot nl) - Fixed bug #45599 (strip_tags() truncates rest of string with invalid attribute). (Ilia, hradtke) - Fixed bug #44827 (define() allows :: in constant names). (Ilia) --- Module Name: pkgsrc Committed By: taca Date: Sat Feb 27 03:35:12 UTC 2010 Modified Files: pkgsrc/archivers/php-zlib: Makefile pkgsrc/databases/php-dba: Makefile pkgsrc/databases/php-ldap: Makefile pkgsrc/databases/php-mssql: Makefile pkgsrc/databases/php-pdo_dblib: Makefile pkgsrc/databases/php-pdo_pgsql: Makefile pkgsrc/databases/php-pgsql: Makefile pkgsrc/graphics/php-exif: Makefile pkgsrc/graphics/php-gd: Makefile pkgsrc/mail/php-imap: Makefile pkgsrc/net/php-ftp: Makefile pkgsrc/print/php-pdflib: Makefile pkgsrc/www/php-curl: Makefile Log Message: Reset PKGREVISION. --- Module Name: pkgsrc Committed By: taca Date: Wed Mar 3 10:51:35 UTC 2010 Modified Files: pkgsrc/lang/php5: Makefile.php Log Message: Re-enable suhosin option since there is no need to disable it. Noted by Volkmar Seifert and I misunderstood something. --- Module Name: pkgsrc Committed By: taca Date: Thu Mar 4 15:36:04 UTC 2010 Modified Files: pkgsrc/lang/php5: Makefile Makefile.php distinfo Log Message: Update suhosin patch for PHP 5.2.13. Bump PKGREVISION.
2010-02-28Pullup ticket #3026 - requested by spztron2-6/+6
curl: security update Revisions pulled up: - www/curl/Makefile 1.96 - www/curl/distinfo 1.64 - www/curl/patches/patch-ab delete --- Module Name: pkgsrc Committed By: wiz Date: Tue Feb 16 12:51:44 UTC 2010 Modified Files: pkgsrc/www/curl: Makefile distinfo Removed Files: pkgsrc/www/curl/patches: patch-ab Log Message: Update to 7.20.0: Version 7.20.0 (9 February 2010) Daniel Stenberg (9 Feb 2010) - When downloading compressed content over HTTP and the app asked libcurl to automatically uncompress it with the CURLOPT_ENCODING option, libcurl could wrongly provide the callback with more data than the maximum documented amount. An application could thus get tricked into badness if the maximum limit was trusted to be enforced by libcurl itself (as it is documented). This is further detailed and explained in the libcurl security advisory 20100209 at http://curl.haxx.se/docs/adv_20100209.html Daniel Fandrich (3 Feb 2010) - Changed the Watcom makefiles to make them easier to keep in sync with Makefile.inc since that can't be included directly. Yang Tse (2 Feb 2010) - Symbol CURL_FORMAT_OFF_T now obsoleted, will be removed in a future release, symbol will not be available when building with CURL_NO_OLDIES defined. Use of CURL_FORMAT_CURL_OFF_T is preferred since 7.19.0 Daniel Stenberg (1 Feb 2010) - Using the multi_socket API, it turns out at times it seemed to "forget" connections (which caused a hang). It turned out to be an existing (7.19.7) bug in libcurl (that's been around for a long time) and it happened like this: The app calls curl_multi_add_handle() to add a new easy handle, libcurl will then set it to timeout in 1 millisecond so libcurl will tell the app about it. The app's timeout fires off that there's a timeout, the app calls libcurl as we so often document it: do { res = curl_multi_socket_action(... TIMEOUT ...); } while(CURLM_CALL_MULTI_PERFORM == res); And this is the problem number one: When curl_multi_socket_action() is called with no specific handle, but only a timeout-action, it will *only* perform actions within libcurl that are marked to run at this time. In this case, the request would go from INIT to CONNECT and return CURLM_CALL_MULTI_PERFORM. When the app then calls libcurl again, there's no timer set for this handle so it remains in the CONNECT state. The CONNECT state is a transitional state in libcurl so it reports no sockets there, and thus libcurl never tells the app anything more about that easy handle/connection. libcurl _does_ set a 1ms timeout for the handle at the end of multi_runsingle() if it returns CURLM_CALL_MULTI_PERFORM, but since the loop is instant the new job is not ready to run at that point (and there's no code that makes libcurl call the app to update the timout for this new timeout). It will simply rely on that some other timeout will trigger later on or that something else will update the timeout callback. This makes the bug fairly hard to repeat. The fix made to adress this issue: We introduce a loop in lib/multi.c around all calls to multi_runsingle() and simply check for CURLM_CALL_MULTI_PERFORM internally. This has the added benefit that this goes in line with my long-term wishes to get rid of the CURLM_CALL_MULTI_PERFORM all together from the public API. The downside of this fix, is that the counter we return in 'running_handles' in several of our public functions then gets a slightly new and possibly confusing behavior during times: If an app adds a handle that fails to connect (very quickly) it may just as well never appear as a 'running_handle' with this fix. Previously it would first bump the counter only to get it decreased again at next call. Even I have used that change in handle counter to signal "end of a transfer". The only *good* way to find the end of a individual transfer is calling curl_multi_info_read() to see if it returns one. Of course, if the app previously did the looping before it checked the counter, it really shouldn't be any new effect. Yang Tse (26 Jan 2010) - Constantine Sapuntzakis' and Joshua Kwan's work done in the last four months relative to the asynchronous DNS lookups, along with with some integration adjustments I have done are finally committed to CVS. Currently these enhancements will benefit builds done using c-ares on any platform as well as Windows builds using the default threaded resolver. This release does not make generally available POSIX threaded DNS lookups yet. There is no configure option to enable this feature yet. It is possible to experimantally try this feature running configure with compiler flags that make simultaneous definition of preprocessor symbols USE_THREADS_POSIX and HAVE_PTHREAD_H, as well as whatever reentrancy compiler flags and linker ones are required to link and properly use pthread_* functions on each platform. Daniel Stenberg (26 Jan 2010) - Mike Crowe made libcurl return CURLE_COULDNT_RESOLVE_PROXY when it is the proxy that cannot be resolved when using c-ares. This matches the behaviour when not using c-ares. Bj - Added a new flag: -J/--remote-header-name. This option tells the -O/--remote-name option to use the server-specified Content-Disposition filename instead of extracting a filename from the URL. Daniel Stenberg (21 Jan 2010) - Chris Conroy brought support for RTSP transfers, and with it comes 8(!) new libcurl options for controlling what to get and how to receive posssibly interleaved RTP data. Daniel Stenberg (20 Jan 2010) - As was pointed out on the http-state mailing list, the order of cookies in a HTTP Cookie: header _needs_ to be sorted on the path length in the cases where two cookies using the same name are set more than once using (overlapping) paths. Realizing this, identically named cookies must be sorted correctly. But detecting only identically named cookies and take care of them individually is harder than just to blindly and unconditionally sort all cookies based on their path lengths. All major browsers also already do this, so this makes our behavior one step closer to them in the cookie area. Test case 8 was the only one that broke due to this change and I updated it accordingly. Daniel Stenberg (19 Jan 2010) - David McCreedy brought a fix and a new test case (129) to make libcurl work again when downloading files over FTP using ASCII and it turns out that the final size of the file is not the same as the initial size the server reported. This is very common since servers don't take the newline conversions into account. Kamil Dudka (14 Jan 2010) - Suppressed side effect of OpenSSL configure checks, which prevented NSS from being properly detected under certain circumstances. It had been caused by strange behavior of pkg-config when handling PKG_CONFIG_LIBDIR. pkg-config distinguishes among empty and non-existent environment variable in that case. Daniel Stenberg (12 Jan 2010) - Gil Weber reported a peculiar flaw with the multi interface when doing SFTP transfers: curl_multi_fdset() would return -1 and not set and file descriptors several times during a transfer of a single file. It turned out to be due to two different flaws now fixed. Gil's excellent recipe helped me nail this. Daniel Stenberg (11 Jan 2010) - Made sure that the progress callback is repeatedly called at a regular interval even during very slow connects. - The tests/runtests.pl script now checks to see if the test case that runs is present in the tests/data/Makefile.am and outputs a notice message on the screen if not. Each test file has to be included in that Makefile.am to get included in release archives and forgetting to add files there is a common mistake. This is an attempt to make it harder to forget. Daniel Stenberg (9 Jan 2010) - Johan van Selst found and fixed a OpenSSL session ref count leak: ossl_connect_step3() increments an SSL session handle reference counter on each call. When sessions are re-used this reference counter may be incremented many times, but it will be decremented only once when done (by Curl_ossl_session_free()); and the internal OpenSSL data will not be freed if this reference count remains positive. When a session is re-used the reference counter should be corrected by explicitly calling SSL_SESSION_free() after each consecutive SSL_get1_session() to avoid introducing a memory leak. (http://curl.haxx.se/bug/view.cgi?id=2926284) Daniel Stenberg (7 Jan 2010) - Make sure the progress callback is called repeatedly even during very slow name resolves when c-ares is used for resolving. Claes Jakobsson (6 Jan 2010) - Julien Chaffraix fixed so that the fragment part in an URL is not sent to the server anymore. Kamil Dudka (3 Jan 2010) - Julien Chaffraix eliminated a duplicated initialization in singlesocket(). Daniel Stenberg (2 Jan 2010) - Make curl support --ssl and --ssl-reqd instead of the previous FTP-specific versions --ftp-ssl and --ftp-ssl-reqd as these options are now used to control SSL/TLS for IMAP, POP3 and SMTP as well in addition to FTP. The old option names are still working but the new ones are the ones listed and documented. Daniel Stenberg (1 Jan 2010) - Ingmar Runge enhanced libcurl's FTP engine to support the PRET command. This command is a special "hack" used by the drftpd server, but even though it is a custom extension I've deemed it fine to add to libcurl since this server seems to survive and people keep using it and want libcurl to support it. The new libcurl option is named CURLOPT_FTP_USE_PRET, and it is also usable from the curl tool with --ftp-pret. Using this option on a server that doesn't support this command will make libcurl fail. I added test cases 1107 and 1108 to verify the functionality. The PRET command is documented at http://www.drftpd.org/index.php/Distributed_PASV Yang Tse (30 Dec 2009) - Steven M. Schweda improved VMS build system, and Craig A. Berry helped with the patch and testing. Daniel Stenberg (26 Dec 2009) - Renato Botelho and Peter Pentchev brought a patch that makes the libcurl headers work correctly even on FreeBSD systems before v8. (http://curl.haxx.se/bug/view.cgi?id=2916915) Daniel Stenberg (17 Dec 2009) - David Byron fixed Curl_ossl_cleanup to actually call ENGINE_cleanup when available. - Follow-up fix for the proxy fix I did for Jon Nelson's bug. It turned out I was a bit too quick and broke test case 1101 with that change. The order of some of the setups is sensitive. I now changed it slightly again to make sure we do them in this order: 1 - parse URL and figure out what protocol is used in the URL 2 - prepend protocol:// to URL if missing 3 - parse name+password off URL, which needs to know what protocol is used (since only some allows for name+password in the URL) 4 - figure out if a proxy should be used set by an option 5 - if no proxy option, check proxy environment variables 6 - run the protocol-specific setup function, which needs to have the proxy already set Daniel Stenberg (15 Dec 2009) - Jon Nelson found a regression that turned out to be a flaw in how libcurl detects and uses proxies based on the environment variables. If the proxy was given as an explicit option it worked, but due to the setup order mistake proxies would not be used fine for a few protocols when picked up from '[protocol]_proxy'. Obviously this broke after 7.19.4. I now also added test case 1106 that verifies this functionality. (http://curl.haxx.se/bug/view.cgi?id=2913886) Daniel Stenberg (12 Dec 2009) - IMAP, POP3 and SMTP support and their TLS versions (including IMAPS, POP3S and SMTPS) are now supported. The current state may not yet be solid, but the foundation is in place and the test suite has some initial support for these protocols. Work will now persue to make them nice libcurl citizens until release. The work with supporting these new protocols was sponsored by networking4all.com - thanks! Daniel Stenberg (10 Dec 2009) - Siegfried Gyuricsko found out that the curl manual said --retry would retry on FTP errors in the transient 5xx range. Transient FTP errors are in the 4xx range. The code itself only tried on 5xx errors that occured _at login_. Now the retry code retries on all FTP transfer failures that ended with a 4xx response. (http://curl.haxx.se/bug/view.cgi?id=2911279) - Constantine Sapuntzakis figured out a case which would lead to libcurl accessing alredy freed memory and thus crash when using HTTPS (with OpenSSL), multi interface and the CURLOPT_DEBUGFUNCTION and a certain order of cleaning things up. I fixed it. (http://curl.haxx.se/bug/view.cgi?id=2905220) Daniel Stenberg (7 Dec 2009) - Martin Storsjo made libcurl use the Expect: 100-continue header for posts with unknown size. Previously it was only used for posts with a known size larger than 1024 bytes. Daniel Stenberg (1 Dec 2009) - If the Expect: 100-continue header has been set by the application through curl_easy_setopt with CURLOPT_HTTPHEADER, the library should set data->state.expect100header accordingly - the current code (in 7.19.7 at least) doesn't handle this properly. Martin Storsjo provided the fix! Yang Tse (28 Nov 2009) - Added Diffie-Hellman parameters to several test harness certificate files in PEM format. Required by several stunnel versions used by our test harness. Daniel Stenberg (28 Nov 2009) - Markus Koetter provided a polished and updated version of Chad Monroe's TFTP rework patch that now integrates TFTP properly into libcurl so that it can be used non-blocking with the multi interface and more. BLKSIZE also works. The --tftp-blksize option was added to allow setting the TFTP BLKSIZE from the command line. Daniel Stenberg (26 Nov 2009) - Extended and fixed the change I did on Dec 11 for the the progress meter/callback during FTP command/response sequences. It turned out it was really lame before and now the progress meter SHOULD get called at least once per second. Daniel Stenberg (23 Nov 2009) - Bjorn Augustsson reported a bug which made curl not report any problems even though it failed to write a very small download to disk (done in a single fwrite call). It turned out to be because fwrite() returned success, but there was insufficient error-checking for the fclose() call which tricked curl to believe things were fine. Yang Tse (23 Nov 2009) - David Byron modified Makefile.dist vc8 and vc9 targets in order to allow finer granularity control when generating src and lib makefiles. Yang Tse (22 Nov 2009) - I modified configure to force removal of the curlbuild.h file included in distribution tarballs for use by non-configure systems. As intended, this would get overwriten when doing in-tree builds. But VPATH builds would end having two curlbuild.h files, one in the source tree and another in the build tree. With the modification I introduced 5 Nov 2009 this could become an issue when running libcurl's test suite. Daniel Stenberg (20 Nov 2009) - Constantine Sapuntzakis identified a write after close, as the sockets were closed by libcurl before the SSL lib were shutdown and they may write to its socket. Detected to at least happen with OpenSSL builds. - Jad Chamcham pointed out a bug with connection re-use. If a connection had CURLOPT_HTTPPROXYTUNNEL enabled over a proxy, a subsequent request using the same proxy with the tunnel option disabled would still wrongly re-use that previous connection and the outcome would only be badness. Yang Tse (18 Nov 2009) - I modified the memory tracking system to make it intolerant with zero sized malloc(), calloc() and realloc() function calls. Daniel Stenberg (17 Nov 2009) - Constantine Sapuntzakis provided another fix for the DNS cache that could end up with entries that wouldn't time-out: 1. Set up a first web server that redirects (307) to a http://server:port that's down 2. Have curl connect to the first web server using curl multi After the curl_easy_cleanup call, there will be curl dns entries hanging around with in_use != 0. (http://curl.haxx.se/bug/view.cgi?id=2891591) - Marc Kleine-Budde fixed: curl saved the LDFLAGS set during configure into its pkg-config file. So -Wl stuff ended up in the .pc file, which is really bad, and breaks if there are multiple -Wl in our LDFLAGS (which are in PTXdist). bug #2893592 (http://curl.haxx.se/bug/view.cgi?id=2893592) Kamil Dudka (15 Nov 2009) - David Byron improved the configure script to use pkg-config to find OpenSSL (and in particular the list of required libraries) even if a path is given as argument to --with-ssl Yang Tse (15 Nov 2009) - I removed enable-thread / disable-thread configure option. These were only placebo options. The library is always built as thread safe as possible on every system. Claes Jakobsson (14 Nov 2009) - curl-config now accepts '--configure' to see what arguments was passed to the configure script when building curl. Daniel Stenberg (14 Nov 2009) - Claes Jakobsson restored the configure functionality to detect NSS when --with-nss is set but not "yes". I think we can still improve that to check for pkg-config in that path etc, but at least this patch brings back the same functionality we had before. - Camille Moncelier added support for the file type SSL_FILETYPE_ENGINE for the client certificate. It also disable the key name test as some engines can select a private key/cert automatically (When there is only one key and/or certificate on the hardware device used by the engine) Yang Tse (14 Nov 2009) - Constantine Sapuntzakis provided the fix that ensures that an SSL connection won't be reused unless protection level for peer and host verification match. I refactored how preprocessor symbol _THREAD_SAFE definition is done. Kamil Dudka (12 Nov 2009) - Kevin Baughman provided a fix preventing libcurl-NSS from crash on doubly closed NSPR descriptor. The issue was hard to find, reported several times before and always closed unresolved. More info at the RH bug: https://bugzilla.redhat.com/534176 - libcurl-NSS now tries to reconnect with TLS disabled in case it detects a broken TLS server. However it does not happen if SSL version is selected manually. The approach was originally taken from PSM. Kaspar Brand helped me to complete the patch. Original bug reports: https://bugzilla.redhat.com/525496 https://bugzilla.redhat.com/527771 Yang Tse (12 Nov 2009) - I modified configure script to make the getaddrinfo function check also verify if the function is thread safe. Yang Tse (11 Nov 2009) - Marco Maggi reported that compilation failed when configured --with-gssapi and GNU GSS installed due to a missing mutual exclusion of header files in the Kerberos 5 code path. He also verified that my patch worked for him. Daniel Stenberg (11 Nov 2009) - Constantine Sapuntzakis posted bug #2891595 (http://curl.haxx.se/bug/view.cgi?id=2891595) which identified how an entry in the DNS cache would linger too long if the request that added it was in use that long. He also provided the patch that now makes libcurl capable of still doing a request while the DNS hash entry may get timed out. - Christian Schmitz noticed that the progress meter/callback was not properly used during the FTP connection phase (after the actual TCP connect), while it of course should be. I also made the speed check get called correctly so that really slow servers will trigger that properly too. Kamil Dudka (5 Nov 2009) - Dropped misleading timeouts in libcurl-NSS and made sure the SSL socket works in non-blocking mode. Yang Tse (5 Nov 2009) - I removed leading 'curl' path on the 'curlbuild.h' include statement in curl.h, adjusting auto-makefiles include path, to enhance portability to OS's without an orthogonal directory tree structure such as OS/400. Daniel Stenberg (4 Nov 2009) - I fixed several problems with the transfer progress meter. It showed the wrong percentage for small files, most notable for <1000 bytes and could easily end up showing more than 100% at the end. It also didn't show any percentage, transfer size or estimated transfer times when transferring less than 100 bytes.
2010-02-24Pullup ticket #3019 - requested by tacatron3-13/+19
typo3: security update Revisions pulled up: - www/typo3/Makefile 1.19 - www/typo3/PLIST 1.11 - www/typo3/distinfo 1.13 --- Module Name: pkgsrc Committed By: taca Date: Tue Feb 23 14:12:22 UTC 2010 Modified Files: pkgsrc/www/typo3: Makefile PLIST distinfo Log Message: Update typo3 package to 4.3.2. For complete changes, please refer ChangeLog file. Also switch DESTDIR support to user-destdir. the TYPO3 core team has just released the TYPO3 versions 4.3.2 and 4.2.12, which are now ready for you to download. All versions are maintenance releases and contain bugfixes and security fixes. IMPORTANT: These versions include important security fixes to the TYPO3 core. A security announcement has just been released: https://typo3.org/teams/security/security-bulletins/typo3-sa-2010-004/
2010-02-19Pullup ticket #3011 - requested by tnntron2-6/+6
seamonkey: security update Revisions pulled up: - www/seamonkey/Makefile 1.32-1.33 - www/seamonkey/distinfo 1.45-1.46 --- Module Name: pkgsrc Committed By: tnn Date: Mon Jan 25 14:43:20 UTC 2010 Modified Files: pkgsrc/www/seamonkey: Makefile distinfo Log Message: Update to seamonkey-2.0.2. General stability/bugfix update. --- Module Name: pkgsrc Committed By: tnn Date: Wed Feb 17 20:22:45 UTC 2010 Modified Files: pkgsrc/www/seamonkey: Makefile distinfo Log Message: Update to seamonkey-2.0.3. Security and bugfix release.
2010-02-17Pullup ticket 3009 - requested by tnnspz1-2/+2
security and bug fixes Revisions pulled up: - pkgsrc/devel/nspr/Makefile by patch to equiv of 1.34 - pkgsrc/devel/xulrunner/dist.mk by patch to equiv of 1.7 - pkgsrc/devel/xulrunner/distinfo by patch to equiv of 1.24 - pkgsrc/www/firefox/Makefile by patch to equiv of 1.70 -------------------------------------------------------------------- The attached diff against 2009Q4 updates firefox to 3.5.8. This is a security and bugfix update.
2010-02-15Pullup ticket 3003 - requested by tacaspz2-6/+6
security update Revisions pulled up: - pkgsrc/www/squid30/Makefile 1.20 - pkgsrc/www/squid30/distinfo 1.18 ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: taca Date: Sun Feb 14 13:37:02 UTC 2010 Modified Files: pkgsrc/www/squid30: Makefile distinfo Log Message: Update squid to 3.0.24 (3.0.STABLE24). Changes to squid-3.0.STABLE24 (13 Feb 2010): - Bug 2858: Segment violation in HTCP - Updated refresh pattern for dynamic pages To generate a diff of this commit: cvs rdiff -u -r1.19 -r1.20 pkgsrc/www/squid30/Makefile cvs rdiff -u -r1.17 -r1.18 pkgsrc/www/squid30/distinfo
2010-02-15Pullup ticket 3002 - requested by tacaspz3-3/+29
security fix Revisions pulled up: - pkgsrc/www/squid27/Makefile 1.12 - pkgsrc/www/squid27/distinfo 1.8 Files added: pkgsrc/www/squid27/patches/patch-ao ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: taca Date: Sun Feb 14 13:27:52 UTC 2010 Modified Files: pkgsrc/www/squid27: Makefile distinfo Added Files: pkgsrc/www/squid27/patches: patch-ao Log Message: Add a security patch described security advisory SQUID-2010_2.txt, http://www.squid-cache.org/Advisories/SQUID-2010_2.txt Patch was the same content as official one. http://www.squid-cache.org/Versions/v2/2.7/changesets/12600.patch. To generate a diff of this commit: cvs rdiff -u -r1.11 -r1.12 pkgsrc/www/squid27/Makefile cvs rdiff -u -r1.7 -r1.8 pkgsrc/www/squid27/distinfo cvs rdiff -u -r0 -r1.1 pkgsrc/www/squid27/patches/patch-ao
2010-02-10Pullup ticket 2996 - requested by dhollandspz5-9/+20
security update Revisions pulled up: - pkgsrc/www/apache/Makefile 1.199 - pkgsrc/www/apache/distinfo 1.60 - pkgsrc/www/ap-ssl/Makefile 1.109 - pkgsrc/www/ap-ssl/distinfo 1.35 Files added: pkgsrc/www/ap-ssl/patches/patch-ac ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: dholland Date: Tue Feb 9 07:22:06 UTC 2010 Modified Files: pkgsrc/www/apache: Makefile distinfo Log Message: Update to 1.3.42, fixing CVE-2010-0010. Note: this package is now EOL upstream. The next security bug probably won't get patched, so if you're still using this, it's time to migrate to 2.x. To generate a diff of this commit: cvs rdiff -u -r1.198 -r1.199 pkgsrc/www/apache/Makefile cvs rdiff -u -r1.59 -r1.60 pkgsrc/www/apache/distinfo ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: dholland Date: Wed Feb 10 03:55:18 UTC 2010 Modified Files: pkgsrc/www/ap-ssl: Makefile distinfo Added Files: pkgsrc/www/ap-ssl/patches: patch-ac Log Message: Hack this to build against Apache 1.3.42. As 1.3.42 doesn't change anything significant in the internals, all this requires is patching the accepted version and bumping BUILDLINK_API_DEPENDS. PKGREVISION++. To generate a diff of this commit: cvs rdiff -u -r1.108 -r1.109 pkgsrc/www/ap-ssl/Makefile cvs rdiff -u -r1.34 -r1.35 pkgsrc/www/ap-ssl/distinfo cvs rdiff -u -r0 -r1.3 pkgsrc/www/ap-ssl/patches/patch-ac
2010-02-02Pullup ticket 2984 - requested by tronspz4-174/+6
security update Revisions pulled up: - pkgsrc/www/squid31/Makefile 1.17 - pkgsrc/www/squid31/distinfo 1.15 Files removed: pkgsrc/www/squid31/patches/patch-ah pkgsrc/www/squid31/patches/patch-am ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Tue Feb 2 13:57:49 UTC 2010 Modified Files: pkgsrc/www/squid31: Makefile distinfo Removed Files: pkgsrc/www/squid31/patches: patch-ah patch-am Log Message: Update "squid31" package to version 3.1.0.16. Changes since 3.1.0.15: - Regression Fix: Make Squid abort on all config parse failures. - Regression Bug 2811: SNMP client/peer table OID numbering - Bug 2851: Connection pinning fails when using a peer - Bug 2850: Mismatch in hier_code enum / hier_strings array - Bug 2731: Add follow_x_forwarded_for support to ICAP - Bug 2730: Regressions in follow_x_forwarded_for since Squid-2 - Bug 2706: Set timestamps during ICAP request satisfaction. - Bug 2553: X-Forwarded-For with IPv6 address not handled correctly - Fix: WCCPv1 not connecting to router correctly - Remove obsolete RunCache/RunAccel scripts. - Add client_ip_max_connections - Add the http::>ha format code and make http::>h log original request headers - ... and all bug fixes from 3.0 up to 3.0.STABLE22 - ... and many more minor build and display annoyances. This update also contains the fix for the remote DoS vulnerability reported in "Squid Proxy Cache Security Update Advisory SQUID-2010:1". To generate a diff of this commit: cvs rdiff -u -r1.16 -r1.17 pkgsrc/www/squid31/Makefile cvs rdiff -u -r1.14 -r1.15 pkgsrc/www/squid31/distinfo cvs rdiff -u -r1.2 -r0 pkgsrc/www/squid31/patches/patch-ah \ pkgsrc/www/squid31/patches/patch-am
2010-02-02Pullup ticket #2987 - requested by tacatron2-6/+6
squid30: security update Revisions pulled up: - www/squid30/Makefile 1.19 - www/squid30/distinfo 1.17 --- Module Name: pkgsrc Committed By: taca Date: Tue Feb 2 14:53:37 UTC 2010 Modified Files: pkgsrc/www/squid30: Makefile distinfo Log Message: Update squid30 pakcage to squid-3.0.23 (squid-3.0.STABLE23). http://www.squid-cache.org/Advisories/SQUID-2010_1.txt Changes to squid-3.0.STABLE23 (02 Feb 2010): - Bug 2856: removing assert() required for 3.0 patch for SQUID-2010:1 - Regression Fix: Build error in Kerberos helper after library removal. Changes to squid-3.0.STABLE22 (01 Feb 2010): - Regression Fix: Make Squid abort on all config parse failures. - Bug 2787: Reduce unexpected http status to non-critical warnings. - Bug 2496: Downloading some variants in full before relaying - Bug 2452: Add upper limit to external_acl_type entries. - Removed optional kerberos/spnegohelp/ library due to licensing issues - Add client_ip_max_connections - Handle DNS header-only packets as invalid.
2010-02-02Pullup ticket #2896 - requested by tacatron3-3/+28
squid27: security patch Revisions pulled up: - www/squid27/Makefile 1.11 - www/squid27/distinfo 1.7 - www/squid27/patches/patch-an 1.1 --- Module Name: pkgsrc Committed By: taca Date: Tue Feb 2 14:43:57 UTC 2010 Modified Files: pkgsrc/www/squid27: Makefile distinfo Added Files: pkgsrc/www/squid27/patches: patch-an Log Message: Add security patch noted as http://www.squid-cache.org/Advisories/SQUID-2010_1.txt. Bump PKGREVISION.
2010-01-28Pullup ticket #2979 - requested by spztron3-6/+14
apache-tomcat6: security update Revisions pulled up: - www/apache-tomcat6/MESSAGE 1.1 - www/apache-tomcat6/Makefile 1.5 - www/apache-tomcat6/distinfo 1.3 --- Module Name: pkgsrc Committed By: spz Date: Thu Jan 28 12:16:45 UTC 2010 Modified Files: pkgsrc/www/apache-tomcat6: Makefile distinfo Added Files: pkgsrc/www/apache-tomcat6: MESSAGE Log Message: update to the fresh release The changelog from 6.0.20 to 6.0.24 is quite lengthy, please refer to http://tomcat.apache.org/tomcat-6.0-doc/changelog.html for details fixes CVE-2009-2693, CVE-2009-2901 and CVE-2009-2902
2010-01-14Update typo3 package to 4.3.1taca3-10/+11
he TYPO3 core team has just released TYPO3 version 4.3.1, which is now ready for you to download. It is a maintenance release of the current stable branch 4.3 and contains bugfixes and security fixes. IMPORTANT: This version includes important security fixes to the TYPO3 core. A security announcement has just been released: http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-001/ For details about the release, see: http://wiki.typo3.org/index.php/TYPO3_4.3.1
2010-01-12Update HOMEPAGE and MASTER_SITES to catch up rearrange of the site.obache1-3/+3
Problem noticed by Bug Hunting via PR#42609. At the moment, MASTER_SITES is commented out. Although it is linked from HOMEPAGE, but only have very old version now. (and tarball from http://pypi.python.org/pypi/urlgrabber is checksum mismatch).
2010-01-08Fix bash reference. Bump revision.joerg1-2/+4
2010-01-08ass patches from webkit CVS to fix security problemsdrochner3-6/+281
(CVE-2009-2816, CVE-2009-3384), bump PKGREVISION
2010-01-06Add two patches to fix CVE-2009-4405, taken from upstream.obache4-2/+74
Bump PKGREVISION.
2010-01-06- firefox-bin-nightly.wiz1-2/+1
2010-01-04Installation doesn't work with destdir. Make sure to pull include/openssljoerg1-6/+7
into the include path. Mark as only for Apache 2.2.
2010-01-04Remove www/firefox-bin-nightly, it has been marked as BROKEN for ages.joerg5-49/+0
2010-01-03Update to 0.11.6, addressinggdt2-6/+6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4405 From release notes at: http://trac.edgewall.org/browser/tags/trac-0.11.6/RELEASE November 28, 2009 Trac 0.11.6 contains two security fixes and a number of bug fixes, performance improvements and minor enhancements. Changes in 0.11.6 * Fixed the policy checks in report results when using alternate formats. * Added a check for the "raw" role that is missing in docutils < 0.6. * Re-enabled connection pooling with SQLite (#3446). * Added caching of configuration options (#8510). * Fixed the "database is locked" issue with SQLite (#3446, #8468). * Deprecated SQLite 2.x support (#8625). * Fixed hanlding of times in timezones with DST (#8240). * Avoid corruption of trac.ini during write (#8623). * Improved support for revision ranges in the revision log view (#8349) updating during freeze approved by wiz@
2010-01-03Update to 3.20100102.3 ("Happy palindrome day!"). From the changelog:schmonz2-6/+6
* pagestats: Add show parameter. Closes: #562129 * toc: Add startlevel parameter. (kerravonsen) * comments: Add a checksum to the name of comment pages, to avoid merge conflicts when comments are posted to two branches of a site. * linkmap: Add option to omit disconnected pages from the map. * inline: Fix bug that limited displayed pages when feedshow was specified w/o show. * Fix several places that did not properly handle capitalization of the discussionpage setting. Specifically, fixes discussion actions on discussion pages, and unbreaks the opendiscussion plugin. Updating during the freeze for relevant bugfixes, particularly this last.
2009-12-30Remove seamonkey-bin-nightly. It is completely outdated and can't evenjoerg7-64/+1
be fetched. Proposed on tech-pkg, OK wiz
2009-12-30Update typolight28-translations package to 20091228.taca3-8/+8
Update Turkish translation files.
2009-12-30Update typolight27-translations package to 20091228.taca3-8/+8
Update Turkish translation files.
2009-12-28Add bash to USE_TOOLS, instead of BUILD_DEPENDS.obache1-4/+3
2009-12-26Re-add patch-ab, fixes runtime error on Interix.obache2-1/+17
It initially existed originally came from PR#27567 for www/apache2. CVE-2007-3304 parts was added in rev 1.2, then whole patch file was removed in rev 1.3 as update to apache-2.2.6, because the update contains fix for CVE-2007-3304 and comments of patch-ab only mentioned about the CVE. To prevent a recurrence of such a accident, added PR#27567 as comments for patch-ab.
2009-12-25Update www/squid30 package to 3.0.21 (3.0.2.STABLE21).taca2-6/+6
Changes to squid-3.0.STABLE21 (22 Dec 2009): - Bug 2830: Clarify where NULL byte is in headers. - Bug 2778: Linking issues using SunCC - Bug 2395: FTP errors not displayed - Bug 2155: Assertion failures on malformed Content-Range response headers - Fix parsing and a few bugs in ACL time type - Fix RFC keep-alive compliance on intercepted replies - Improved security hardening on %nn parser - Replace several GCC-specific code snippets.
2009-12-24Fix HOMEPAGE and MASTER_SITES.sborrill1-3/+4
Bump PKGREVISION
2009-12-24Update typolight28 package to 2.8rc2.taca4-14/+20
Major changes: * Security fix for install tools * Improved event lists http://www.typolight.org/news/items/typolight-2_8_RC2.html
2009-12-23www/typolight* work with PHP 5.2 and lator.taca3-18/+18
No functional change.
2009-12-23Add more "used by" comments.taca1-1/+4
2009-12-22Update to 3.20091218. From the changelog:schmonz4-22/+26
* Add complete Spanish basewiki translation done by Fernando Gonzalez de Requena. * Improve javascript onload handling. * monotone: Deal with format change in version 0.45. (Thanks, Richard Levitte) * cvs: Add missing bit to Automator. * attachment: Fix reversion in attachment sorting by age. * Fix utf-8 problems in rename, remove, attachment, 404, sourcepage, and goto. Updating this leaf during the freeze for the bugfixes.
2009-12-21ext/mssql/configure is created too late for patching in other modulejoerg2-10/+10
builds or the main www/php4 package. Patch the config.m4 source instead.
2009-12-21update master_sites.zafer1-2/+2
2009-12-20Update horde to version 3.3.6 in order to fix a cross-site scriptingtonnerre3-20/+62
vulnerability. Changes since version 3.3.3 are not found on the web site for some reason (while changes before 3.3.3 are).
2009-12-20Remove www/opengoo package. Open Goo was rebranded as Feng Office.taca6-3152/+0
2009-12-20Add fengoffice and remove opengoo.taca1-2/+2
2009-12-20Import Feng Office 1.6.1 package, previously it was named Open Goo.taca6-0/+3174
Approved by wiz@ Feng Office formerly known as OpenGoo is an easy to use Open Source Web Office. Manage tasks, documents, contacts, e-mail, calendar, and more... Manage project progress, track time, and bill your customers. Access all information from a single and elegant dashboard. Communicate with co-workers, clients and vendors.
2009-12-20Fix a XSS vulnerabilitymanu3-2/+25
2009-12-20Update to TYPOlight 2.7.6.taca3-8/+7
Only security updates: http://www.typolight.org/news/items/major-security-hole-in-the-typolight-install-tool.html.
2009-12-20Add security fix patches, refering ↵taca4-3/+109
http://www.typolight.org/news/items/major-security-hole-in-the-typolight-install-tool.html. Bump PKGREVISION.
2009-12-19Update www/drupal6 package to 6.15, fixing security problem.taca4-49/+43
Drupal 6.15, 2009-12-16 ---------------------- - Fixed security issues (Cross site scripting), see SA-CORE-2009-009. - Fixed a variety of other bugs. other pkgsrc changes: * Add PKG_DESTDIR_SUPPORT spport. * Use REPLACE_INTERPRETER. * Change default.settings.php handling to fix PR pkg/42355.
2009-12-19Update www/drupal package to 5.21, fixing security problem.taca3-10/+11
Drupal 5.21, 2009-12-16 ----------------------- - Fixed a security issue (Cross site scripting), see SA-CORE-2009-009. - Fixed a variety of small bugs.
2009-12-18Fix some more issues with the b3.mk file.joerg1-4/+4