Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (not verified)) by mollari.NetBSD.org (Postfix) with ESMTPS id 8F52CA654F for ; Sun, 15 Mar 2015 16:33:27 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id 3ECAF14A1CF; Sun, 15 Mar 2015 16:33:27 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 841B614A1A7 for ; Sun, 15 Mar 2015 16:33:23 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id O9_TxGagSO3N for ; Sun, 15 Mar 2015 16:33:22 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id E309314A199 for ; Sun, 15 Mar 2015 16:33:22 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id E055198; Sun, 15 Mar 2015 16:33:22 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Sun, 15 Mar 2015 16:33:22 +0000 From: "Takahiro Kambe" Subject: CVS commit: pkgsrc/www/php-sugarcrm To: pkgsrc-changes@NetBSD.org Reply-To: taca@netbsd.org X-Mailer: log_accum Message-Id: <20150315163322.E055198@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: taca Date: Sun Mar 15 16:33:22 UTC 2015 Modified Files: pkgsrc/www/php-sugarcrm: Makefile PLIST distinfo Log Message: Update php-sugarcrm to 6.5.20. Changes before 6.5.19, please refer: http://support.sugarcrm.com/02_Documentation/01_Sugar_Editions/05_Sugar_Community_Edition/ Fixed Issues Sugar 6.5.20 is a security update released to address certain security vulnerabilities identified during our routine QA checks. We strongly recommend that you install this update at the earliest opportunity. While we have not experienced any reported incidents relating to these vulnerabilities to date, failure to install this update could leave you exposed to the following types of malicious third party attacks: Unauthenticated users may retrieve contents from system-generated files. These vulnerabilities as well as an additional issue have been addressed in release 6.5.20 which is available for download from the Download Manager. Administrators are strongly encouraged to upgrade their Sugar instances running 6.5.x or earlier to 6.5.20 to prevent potential exploitation of these weaknesses. To generate a diff of this commit: cvs rdiff -u -r1.8 -r1.9 pkgsrc/www/php-sugarcrm/Makefile cvs rdiff -u -r1.2 -r1.3 pkgsrc/www/php-sugarcrm/PLIST cvs rdiff -u -r1.4 -r1.5 pkgsrc/www/php-sugarcrm/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.