- upgrade to xoops 2.0.15.
SECURITY fix: A vulnerable describes an SQL injection attack against versions less than 2.0.15. Submitted by: Will Maier <willmaier at ml1.net> - drop maintainership
This commit is contained in:
parent
029b3a12e2
commit
34ee105391
@ -1,16 +1,14 @@
|
||||
# $OpenBSD: Makefile,v 1.4 2005/04/11 01:19:56 naddy Exp $
|
||||
# $OpenBSD: Makefile,v 1.5 2006/10/16 14:05:09 kevlo Exp $
|
||||
|
||||
COMMENT= "dynamic object oriented portal script written in PHP"
|
||||
|
||||
V= 2.0.9.2
|
||||
V= 2.0.15
|
||||
DISTNAME= xoops-${V}
|
||||
PKGNAME= ${DISTNAME}p0
|
||||
PKGNAME= ${DISTNAME}
|
||||
CATEGORIES= www
|
||||
|
||||
HOMEPAGE= http://www.xoops.org/
|
||||
|
||||
MAINTAINER= Kevin Lo <kevlo@openbsd.org>
|
||||
|
||||
PERMIT_PACKAGE_CDROM= Yes
|
||||
PERMIT_PACKAGE_FTP= Yes
|
||||
PERMIT_DISTFILES_CDROM= Yes
|
||||
|
@ -1,4 +1,4 @@
|
||||
MD5 (xoops-2.0.9.2.tar.gz) = 10c620da751aa1b709b2b6f7985021c2
|
||||
RMD160 (xoops-2.0.9.2.tar.gz) = d521b645f8ff15fa1a5a40c78e4e3d05ad980de1
|
||||
SHA1 (xoops-2.0.9.2.tar.gz) = 48f4d505b6eefc4563aab7b0a15a83c6930e2fa6
|
||||
SIZE (xoops-2.0.9.2.tar.gz) = 1118423
|
||||
MD5 (xoops-2.0.15.tar.gz) = 7f75152d460bb19e5de8f1a9295fad36
|
||||
RMD160 (xoops-2.0.15.tar.gz) = 6bdf84a71950a25be8ce07c74dc58bc6dfb3586d
|
||||
SHA1 (xoops-2.0.15.tar.gz) = 4772984189c5d1dbec2af99f3560f0f82301e70a
|
||||
SIZE (xoops-2.0.15.tar.gz) = 893557
|
||||
|
1954
www/xoops/pkg/PLIST
1954
www/xoops/pkg/PLIST
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user