Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (not verified)) by mollari.NetBSD.org (Postfix) with ESMTPS id 711FAA654B for ; Sun, 31 May 2015 21:54:36 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id D92F314A2C4; Sun, 31 May 2015 21:54:35 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 2920714A2C1 for ; Sun, 31 May 2015 21:54:35 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id qA4qLsbKBLlo for ; Sun, 31 May 2015 21:54:34 +0000 (UTC) Received: from nef.pbox.org (ns.pbox.org [IPv6:2001:41d0:1:e836::1]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.netbsd.org (Postfix) with ESMTPS id D1A5F14A2BF for ; Sun, 31 May 2015 21:54:33 +0000 (UTC) Received: from nef.pbox.org (localhost [127.0.0.1]) by nef.pbox.org (8.14.5/8.14.5/) with ESMTP id t4VLsSet007015 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 31 May 2015 23:54:29 +0200 (CEST) Received: (from agc@localhost) by nef.pbox.org (8.14.5/8.14.5/Submit) id t4VLsS8t007257 for pkgsrc-changes@netbsd.org; Sun, 31 May 2015 23:54:28 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id D9AA214A331 for ; Sun, 31 May 2015 20:00:00 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id s_wHwk7cqKV5 for ; Sun, 31 May 2015 19:59:59 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id D135914A32C for ; Sun, 31 May 2015 19:59:59 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id BD42598; Sun, 31 May 2015 19:59:59 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Date: Sun, 31 May 2015 19:59:59 +0000 From: "Ryo ONODERA" Subject: CVS commit: pkgsrc/www/php-ja-wordpress To: pkgsrc-changes@netbsd.org Reply-To: ryoon@netbsd.org X-Mailer: log_accum Message-Id: <20150531195959.BD42598@cvs.netbsd.org> X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.4.3 (nef.pbox.org [0.0.0.0]); Sun, 31 May 2015 23:54:29 +0200 (CEST) Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: ryoon Date: Sun May 31 19:59:59 UTC 2015 Modified Files: pkgsrc/www/php-ja-wordpress: Makefile PLIST distinfo Log Message: Update to 4.2.2 Changelog: WordPress 4.2.2 Security and Maintenance Release Posted May 7, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.2 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Version 4.2.2 addresses two security issues: The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on WordPress.org (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of Netsparker. WordPress versions 4.2 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue. Reported separately by Rice Adu and Tong Shi. The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi. Our thanks to those who have practiced responsible disclosure of security issues. WordPress 4.2.2 also contains fixes for 13 bugs from 4.2. For more information, see the release notes or consult the list of changes. Download WordPress 4.2.2 or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.2. Thanks to everyone who contributed to 4.2.2: Aaron Jorbin, Andrew Ozz, Andrew Nacin, Boone Gorges, Dion Hulse, Ella Iseulde Van Dorpe, Gary Pendergast, Hinaloe, Jeremy Felt, John James Jacoby, Konstantin Kovshenin, Mike Adams, Nikolay Bachiyski, taka2, and willstedt. rdPress.org Showcase Themes Plugins Mobile Support Get Involved About Blog Hosting Download WordPress WordPress 4.2.2 Security and Maintenance Release Posted May 7, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.2 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Version 4.2.2 addresses two security issues: The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on WordPress.org (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of Netsparker. WordPress versions 4.2 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue. Reported separately by Rice Adu and Tong Shi. The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi. Our thanks to those who have practiced responsible disclosure of security issues. WordPress 4.2.2 also contains fixes for 13 bugs from 4.2. For more information, see the release notes or consult the list of changes. Download WordPress 4.2.2 or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.2. Thanks to everyone who contributed to 4.2.2: Aaron Jorbin, Andrew Ozz, Andrew Nacin, Boone Gorges, Dion Hulse, Ella Iseulde Van Dorpe, Gary Pendergast, Hinaloe, Jeremy Felt, John James Jacoby, Konstantin Kovshenin, Mike Adams, Nikolay Bachiyski, taka2, and willstedt. Share this: WordPress 4.2.1 Security Release Posted April 27, 2015 by Gary Pendergast. Filed under Releases, Security. WordPress 4.2.1 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. A few hours ago, the WordPress team was made aware of a cross-site scripting vulnerability, which could enable commenters to compromise a site. The vulnerability was discovered by Jouko Pynnönen. WordPress 4.2.1 has begun to roll out as an automatic background update, for sites that support those. For more information, see the release notes or consult the list of changes. Download WordPress 4.2.1 or venture over to Dashboard → Updates and simply click “Update Now”. WordPress 4.2 An easier way to share content Extended character support Switch themes in the Customizer Even more embeds Streamlined plugin updates Under the Hood utf8mb4 support Database character encoding has changed from utf8 to utf8mb4, which adds support for a whole range of new 4-byte characters. JavaScript accessibility You can now send audible notifications to screen readers in JavaScript with wp.a11y.speak(). Pass it a string, and an update will be sent to a dedicated ARIA live notifications area. Shared term splitting Terms shared across multiple taxonomies will be split when one of them is updated. Find out more in the Plugin Developer Handbook. Complex query ordering WP_Query, WP_Comment_Query, and WP_User_Query now support complex ordering with named meta query clauses. To generate a diff of this commit: cvs rdiff -u -r1.7 -r1.8 pkgsrc/www/php-ja-wordpress/Makefile \ pkgsrc/www/php-ja-wordpress/distinfo cvs rdiff -u -r1.6 -r1.7 pkgsrc/www/php-ja-wordpress/PLIST Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.