aboutsummaryrefslogtreecommitdiff
path: root/www/joomla15
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2006-08-30 12:37:21 +0000
committerRemko Lodder <remko@FreeBSD.org>2006-08-30 12:37:21 +0000
commit70bfbcb0a857c1d2e5f92d38b772e2773854930c (patch)
tree3eb36304966dae9b56475a9b709a51ab2ab14a63 /www/joomla15
parent7233f6668c3c82f68948ff6a3545ffa73f2478af (diff)
downloadports-70bfbcb0a857c1d2e5f92d38b772e2773854930c.tar.gz
ports-70bfbcb0a857c1d2e5f92d38b772e2773854930c.zip
Mark Joomla as FORBIDDEN, there are remote code execution vulnerabilities
within PEAR.php (as mentioned by the joomla developers). The port should be upgraded to 1.0.11 to solve these issues, maintainer had been informed. With hat: secteam
Notes
Notes: svn path=/head/; revision=171665
Diffstat (limited to 'www/joomla15')
-rw-r--r--www/joomla15/Makefile2
1 files changed, 2 insertions, 0 deletions
diff --git a/www/joomla15/Makefile b/www/joomla15/Makefile
index 52ca8b759ebb..51579119d585 100644
--- a/www/joomla15/Makefile
+++ b/www/joomla15/Makefile
@@ -13,6 +13,8 @@ DISTFILES= ${JOOMLA_SRC}:source1
MAINTAINER= include@npf.pt.freebsd.org
COMMENT= A dynamic web content management system (CMS)
+FORBIDDEN= remote code execution: http://vuxml.FreeBSD.org/0ab423e7-3822-11db-81e1-000e0c2e438a.html
+
NO_BUILD= yes
USE_MYSQL= yes
USE_PHP= mysql pcre xml zlib session gd pdf