pkgsrc/www/drupal/distinfo
adrianp 10644dafd0 This release fixes a security vulnerability. Sites are urged to upgrade immediately. For more details, please see the security announcement:
* SA-2007-031 - Drupal core - SQL Injection possible when certain contributed modules are enabled

In addition to this security vulnerability, the following bugs have been fixed since the 5.2 release:

* 178478 by scor: typo in text displyed when the DB is installed but not accessible
* Patch 122759 by Robrecht: fixed broken query in upgrade path.
* 55277 by catch and JirkaRybka: when flat comment view is used, order comments by cid (ie. original submission order) instead of timestamp (ie. last editing time order) to avoid comments jumping around when being edited
* Patch 181063 by chx and bjaspan: fixed problem with drupal_bootstrap() not booting to the proper level.
* 184668 by hazexp, Remove unnecessary ';'
* Patch 182728 by Darren Oh: improved PHPdoc of db_rewrite_sql().
* 93425 by bjaspan: remove pre-Drupal 4.6 era destination handling cruft carried over in comment module
* 154388 (backport of 172262) by JirkaRybka. Better globals handling in install system, so the choosen profile and language are remembered.
* 171117 by JirkaRybka: set access time for admin created or edited accounts so they are exempt from the spam protection we have for accounts never logged in
* Patch 168829 by Neil Drumm: fixed link in documentation.
* 165924 by odious. Use accurate count query for user list.
* 187601 by Bart Jansens. Use correct HTTP status codes for redirects.
* 180109 by JirkaRybka: overcome browser quirk to detect when no taxonomy term was selected
* 134984 by mikesmullin. Fix x2 coordinate for rendering gradients.
2007-12-05 23:16:19 +00:00

5 lines
238 B
Text

$NetBSD: distinfo,v 1.18 2007/12/05 23:16:19 adrianp Exp $
SHA1 (drupal-5.4.tar.gz) = 76e08a766d36d24c4628f61aea47d8961064f29b
RMD160 (drupal-5.4.tar.gz) = ed20245d804cbd2ff7670a164e61b5be6202600e
Size (drupal-5.4.tar.gz) = 753584 bytes