- upgrade to xoops 2.0.15.

SECURITY fix:
A vulnerable describes an SQL injection attack against versions less
than 2.0.15.

Submitted by:	Will Maier <willmaier at ml1.net>

- drop maintainership
This commit is contained in:
kevlo 2006-10-16 14:05:09 +00:00
parent 029b3a12e2
commit 34ee105391
3 changed files with 725 additions and 1245 deletions

View File

@ -1,16 +1,14 @@
# $OpenBSD: Makefile,v 1.4 2005/04/11 01:19:56 naddy Exp $
# $OpenBSD: Makefile,v 1.5 2006/10/16 14:05:09 kevlo Exp $
COMMENT= "dynamic object oriented portal script written in PHP"
V= 2.0.9.2
V= 2.0.15
DISTNAME= xoops-${V}
PKGNAME= ${DISTNAME}p0
PKGNAME= ${DISTNAME}
CATEGORIES= www
HOMEPAGE= http://www.xoops.org/
MAINTAINER= Kevin Lo <kevlo@openbsd.org>
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes

View File

@ -1,4 +1,4 @@
MD5 (xoops-2.0.9.2.tar.gz) = 10c620da751aa1b709b2b6f7985021c2
RMD160 (xoops-2.0.9.2.tar.gz) = d521b645f8ff15fa1a5a40c78e4e3d05ad980de1
SHA1 (xoops-2.0.9.2.tar.gz) = 48f4d505b6eefc4563aab7b0a15a83c6930e2fa6
SIZE (xoops-2.0.9.2.tar.gz) = 1118423
MD5 (xoops-2.0.15.tar.gz) = 7f75152d460bb19e5de8f1a9295fad36
RMD160 (xoops-2.0.15.tar.gz) = 6bdf84a71950a25be8ce07c74dc58bc6dfb3586d
SHA1 (xoops-2.0.15.tar.gz) = 4772984189c5d1dbec2af99f3560f0f82301e70a
SIZE (xoops-2.0.15.tar.gz) = 893557

File diff suppressed because it is too large Load Diff