Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.1_1 12 Nov 2012 21:47:27 |
rene |
Document vulnerabilities in two typo3 components.
Obtained
from: http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/
Feature safe: yes |
1.1_1 12 Nov 2012 13:07:31 |
madpilot |
Fix typo.
Feature safe: yes |
1.1_1 12 Nov 2012 13:04:37 |
madpilot |
- Update to 2.7.1
- Convert to new options framework
- Document US-CERT VU#268267
- Trim Makefile headers
PR: ports/173226
Submitted by: Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
Feature safe: yes |
1.1_1 10 Nov 2012 15:17:31 |
swills |
- Improve latest ruby entry slightly
Feature safe: yes |
1.1_1 10 Nov 2012 14:45:55 |
jase |
- Modify recent e02c572f-2af0-11e2-bb44-003067b2972c entry
- Add constraints to vulnerable versions
- Add additional references
- Improve topic
- Correct description
Feature safe: yes |
1.1_1 10 Nov 2012 04:55:47 |
eadler |
Apply an upstream patch that fixes a security hole
when receiving a special colored message.
The maintainer was contacted but due to the nature of
the issue apply the patch ASAP.
Approved by: secteam-ports (swills)
Security: e02c572f-2af0-11e2-bb44-003067b2972c
Feature safe: yes |
1.1_1 10 Nov 2012 04:00:41 |
swills |
- Update lang/ruby19 to 1.9.3p327
- Document security issue in earlier versions
Security: 5e647ca3-2aea-11e2-b745-001fd0af1a4c
Feature safe: yes |
1.1_1 09 Nov 2012 23:02:15 |
jgh |
- clarification that ASF reported issue for:
- 152e4c7e-2a2e-11e2-99c7-00a0d181e71d
- 4ca26574-2a2c-11e2-99c7-00a0d181e71d
Feature safe: yes |
1.1_1 09 Nov 2012 19:09:32 |
jgh |
- document tomcat vulnerabilities
Feature safe: yes |
1.1_1 09 Nov 2012 04:31:14 |
eadler |
Update latest version and document security issues
PR: ports/173487
Submitted by: Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
Security: 4b8b748e-2a24-11e2-bb44-003067b2972c
Feature safe: yes |
1.1_1 07 Nov 2012 10:15:19 |
rene |
Document new vulnerabilities in www/chromium < 23.0.1271.64
Obtained
from: http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe: yes |
1.1_1 06 Nov 2012 20:45:14 |
crees |
Document opera vulnerabilities
Feature safe: yes |
1.1_1 05 Nov 2012 17:55:45 |
eadler |
Fix minor typo
Feature safe: yes |
1.1_1 05 Nov 2012 17:53:51 |
eadler |
Update latest version and document security issues
PR: ports/172619
Submitted by: tijl
Security: 36533a59-2770-11e2-bb44-003067b2972c
Feature safe: yes |
1.1_1 03 Nov 2012 11:59:52 |
crees |
Correct plural of "vulnerability"
Feature safe: yes |
1.1_1 02 Nov 2012 18:45:32 |
ohauer |
- update apache22 to version 2.22.23
- trim vuxml/Makefile header
with hat apache@
Feature safe: yes
Security: CVE-2012-2687 |
1.1_1 02 Nov 2012 18:08:19 |
olgeni |
Add entry for webmin < 1.600_1 (potential XSS attack).
Feature safe: yes |
1.1_1 02 Nov 2012 03:17:18 |
bdrewery |
- Document ruby vulnerabilities:
* CVE-2012-4464 + CVE-2012-4466
$SAFE escaping vulnerability about Exception#to_s / NameError#to_s
* CVE-2012-4522
Unintentional file creation caused by inserting an illegal NUL character
Reviewed by: eadler
Feature safe: yes |
1.1_1 01 Nov 2012 14:10:55 |
flo |
Update to 3.8.15
Security: 4b738d54-2427-11e2-9817-c8600054b392
Feature safe: yes |
1.1_1 30 Oct 2012 21:01:17 |
rm |
- update to 7.16 [1]
while here:
- trim Makefile header
- remove indefinite article in COMMENT
- remove IGNORE_WITH_PHP and IGNORE_WITH_PGSQL since
we have not this versions in the tree anymore
- fix pkg-plist
- add vuxml entry
PR: 173211
Submitted by: Rick van der Zwet <info at rickvanderzwet dot nl> [1]
Approved by: Nick Hilliard <nick at foobar dot org> (maintainer)
Security: 2adc3e78-22d1-11e2-b9f0-d0df9acfd7e5
Feature safe: yes |
1.1_1 28 Oct 2012 17:03:29 |
flo |
- Update www/firefox{,-i18n} to 16.0.2
- Update seamonkey to 2.13.2
- Update ESR ports and libxul to 10.0.10
- Update nspr to 4.9.3
- Update nss to 3.14
- with GNOMEVFS2 option build its extension, too [1]
- make heap-committed and heap-dirty reporters work in about:memory
- properly mark QT4 as experimental (needs love upstream)
- *miscellaneous cleanups and fixups*
mail/thunderbird will be updated once the tarballs are available.
PR: ports/173052 [1]
Security: 6b3b1b97-207c-11e2-a03f-c8600054b392
Feature safe: yes
In collaboration with: Jan Beich <jbeich@tormail.org> |
1.1_1 26 Oct 2012 08:46:40 |
rea |
mail/exim: upgrade to 4.80.1
This is bugfix-only release, it eliminates remote code execution
in the DKIM code.
Security: http://www.vuxml.org/freebsd/b0f3ab1f-1f3b-11e2-8fe9-0022156e8794.html
QA page: http://codelabs.ru/fbsd/ports/qa/mail/exim/4.80.1
Feature safe: yes |
1.1_1 25 Oct 2012 19:31:50 |
rm |
- add CVE reference (still in reserved state) for recent django vulnerabilty
Feature safe: yes |
1.1_1 25 Oct 2012 10:12:42 |
rm |
- update django ports to 1.3.4 and 1.4.2, that fixing couple of security issues.
All users are encouraged to upgrade immediately.
- add vuxml entry
changes common for both ports:
- trim Makefile header
- strict python version to 2.x only
- utilize options framework multiple choice feature to let user to choose
database backends needed. Make SQLITE option default
- shorten description of HTMLDOCS_DESC to make it fit into dialog screen
- SITELIBDIR -> PKGNAMEPREFIX change in dependencies
- convert NOPORTDOCS condition to optionsng
- tab -> space change in pkg-descr
PR: 173017
Submitted by: rm (myself)
Approved by: lwhsu (maintainer, by mail)
Security: 5f326d75-1db9-11e2-bc8f-d0df9acfd7e5
Feature safe: yes |
1.1_1 22 Oct 2012 02:37:08 |
wxs |
Document multiple wireshark vulnerabilities.
Feature safe: yes |
1.1_1 18 Oct 2012 04:13:28 |
jgh |
- clarify end-user impact for 57652765-18aa-11e2-8382-00a0d181e71d
Suggested by: simon@
Feature safe: yes |
1.1_1 17 Oct 2012 23:47:28 |
jgh |
- document xlockmore issue, 57652765-18aa-11e2-8382-00a0d181e71d, CVE-2012-4524
Feature safe: yes |
1.1_1 17 Oct 2012 17:22:51 |
sem |
- xinetd vulnerability
Feature safe: yes |
1.1_1 16 Oct 2012 14:37:50 |
glarkin |
- Updated ZF advisory to include similar XEE vulnerability
Feature safe: yes |
1.1_1 16 Oct 2012 14:26:07 |
glarkin |
- Document Zend Framework XXE injection vulnerability
Feature safe: yes |
1.1_1 15 Oct 2012 22:31:39 |
eadler |
Update the distinfo as upstream has changed.
I verfied this to be same content as the old version modulo the copyright.
Approved by: secteam (implicit)
Feature safe: yes |
1.1_1 15 Oct 2012 16:31:40 |
eadler |
Add the CVE for the gitolite vuln.
Feature safe: yes |
1.1_1 15 Oct 2012 16:02:13 |
swills |
- Actually commit the VuXML entry
PR: ports/172565
Feature safe: yes
Pointyhat to: swills |
1.1_1 14 Oct 2012 21:05:33 |
matthew |
Document the latest security vulnerabilities for phpMyAdmin.
Fix was already committed to the port 6 days ago.
Feature safe: yes |
1.1_1 14 Oct 2012 15:30:47 |
zi |
- Add in additional package names for recent bind vulnerability
Feature safe: yes |
1.1_1 11 Oct 2012 19:15:12 |
flo |
- update to 16.0.1
- update vuln.xml entry
Feature safe: yes |
1.1_1 10 Oct 2012 22:07:00 |
rene |
Document a new vulnerability in www/chromium < 22.0.1229.94
Obtained
from: http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe: yes |
1.1_1 10 Oct 2012 21:13:07 |
flo |
- Update firefox-esr, thunderbird-esr, linux-firefox and linux-thunderbird to
10.0.8
- Update firefox and thunderbird to 16.0
- Update seamonkey to 2.13
- Update all -i18n ports respectively
- switch firefox 16.0 and seamonkey 2.13 to ALSA by default for better
latency during pause and seeking with HTML5 video
- remove fedisableexcept() hacks, obsolete since FreeBSD 4.0
- support system hunspell dictionaries [1]
- unbreak -esr ports with clang3.2 [2]
- unbreak nss build when CC contains full path [3]
- remove GNOME option grouping [4]
- integrate enigmail into thunderbird/seamonkey as an option [5]
- remove mail/enigmail* [6]
- enable ENIGMAIL, LIGHTNING and GIO options by default
- add more reporters in about:memory: page-faults-hard, page-faults-soft, (Only the first 15 lines of the commit message are shown above ) |
1.1_1 10 Oct 2012 11:54:44 |
erwin |
Upgrade to the latest BIND patch level:
A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.
Security:
http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html |
1.1_1 03 Oct 2012 12:51:12 |
rm |
- correct the range in last entry (le/lt typo) |
1.1_1 03 Oct 2012 12:33:39 |
rm |
- update to 2.8.10
- add vuxml entry
This release fixes SQL injection vulnerability.
PR: 172114
Submitted by: rm (myself)
Approved by: ports-secteam (eadler)
Security: dee44ba9-08ab-11e2-a044-d0df9acfd7e5 |
1.1_1 27 Sep 2012 17:01:15 |
danfe |
Mark nvidia-driver-173.14.35_1 as not vulnerable. |
1.1_1 26 Sep 2012 21:49:34 |
rene |
Document vulnerabilities in www/chromium < 22.0.1229.79
Obtained
from: http://googlechromereleases.blogspot.nl/search/label/Stable%20updates |
1.1_1 26 Sep 2012 15:37:59 |
glarkin |
- Document remote code execution in ePerl (all versions)
- Deprecate and schedule removal in month - no upstream fix available and
no active development since 1998
Security: 73efb1b7-07ec-11e2-a391-000c29033c32
Security: CVE-2001-0733
Security: http://www.shmoo.com/mail/bugtraq/jun01/msg00286.shtml |
1.1_1 25 Sep 2012 21:41:51 |
glarkin |
- Documented PNG file DoS vulnerability in ImageMagick and GraphicsMagick
- Added -nox11 suffixes to various ImageMagick entries |
1.1_1 23 Sep 2012 12:27:22 |
eadler |
Update vuxml to indicate which versions are vulnerable. |
1.1_1 20 Sep 2012 03:02:43 |
bdrewery |
- Update php52 backports patch to 20120911
- Add and update relevant vuxml entries
Changes:
- CVE-2011-1398 - The sapi_header_op function in main/SAPI.c in PHP
before 5.3.11 does not properly handle %0D sequences
- CVE-2012-0789 - Memory leak in the timezone functionality in PHP
before 5.3.9 allows remote attackers to cause a denial of service
(memory consumption) by triggering many strtotime function calls,
which are not properly handled by the php_date_parse_tzfile cache.
- CVE-2012-3365 - The SQLite functionality in PHP before 5.3.15 allows
remote attackers to bypass the open_basedir protection mechanism via
unspecified vectors
- Timezone database updated to version 2012.5 (2012e) (from 2011.13 (2011m))
- Minor improvements (CVE-2012-2688, compilation issues with old GCC)
PR: ports/171583
Submitted by: Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
Approved by: Alex Keda <admin@lissyara.su> (maintainer) |
1.1_1 20 Sep 2012 01:09:57 |
bdrewery |
- CVE-2012-2688 was addressed by php52-5.2.17_10
PR: ports/170063
PR: ports/171583
Reported by: Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
Security: bdab0acd-d4cd-11e1-8a1c-14dae9ebcf89 |
1.1_1 19 Sep 2012 03:46:36 |
dougb |
Upgrade to the latest BIND patch level:
Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.
Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.
ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.
A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.
For more information: https://kb.isc.org/article/AA-00788 |
1.1_1 17 Sep 2012 18:46:52 |
lwhsu |
Document Jenkins Security Advisory 2012-09-17 |
1.1_1 15 Sep 2012 21:25:33 |
eadler |
include newly 'awarded' CVE |
1.1_1 15 Sep 2012 17:22:33 |
nox |
Add vuxml for older versions of multimedia/vlc .
PR: ports/169985
Submitted by: "Anders N." <wicked@baot.se> |
1.1_1 15 Sep 2012 02:19:37 |
eadler |
Tell the world about the recent bacula vuln |
1.1_1 13 Sep 2012 03:35:09 |
swills |
- Update to 0.10.22.6 which fixes two security issues
- Document security issues in vuxml [1]
Reviewed by: bdrewery [1]
Security: 178ba4ea-fd40-11e1-b2ae-001fd0af1a4c |
1.1_1 12 Sep 2012 07:31:22 |
danfe |
Update NVIDIA arbitrary memory access vulnerability with CVE-2012-4225. |
1.1_1 11 Sep 2012 11:38:53 |
zi |
- Update entry for net/freeradius2 to reflect local patch to address
cve-2012-3547 |
1.1_1 11 Sep 2012 08:46:31 |
rea |
VuXML: document remote code execution in freeRADIUS |
1.1_1 11 Sep 2012 07:51:07 |
rea |
www/moinmoin: fix CVE-2012-4404, wrong processing of group ACLs
Using upstream patch from
http://hg.moinmo.in/moin/1.9/raw-rev/7b9f39289e16
PR: 171346
QA page: http://codelabs.ru/fbsd/ports/qa/www/moinmoin/1.9.4_1
Approved by: khsing.cn@gmail.com (maintainer)
Security: http://www.vuxml.org/freebsd/4f99e2ef-f725-11e1-8bd8-0022156e8794.html |
1.1_1 08 Sep 2012 02:37:32 |
eadler |
Add vim specific modeline to help users write correct vuxml
Submitted by: bdrewery |
1.1_1 07 Sep 2012 23:07:15 |
rakuco |
Document the vulnerability that led to emacs 24.2 |
1.1_1 07 Sep 2012 21:34:03 |
eadler |
Add a sanity check to ensure vuxml is actually installed prior to performing
the tidy step in validate. This step actually requires just the dependancies
but the full validate requires that vuxml be installed.
Reviewed by: simon
Approved by: secteam (implicit) |
1.1_1 07 Sep 2012 20:25:41 |
swills |
- Update to 3.4.2 [1] [2] [3]
- Document security issue [4]
PR: ports/171397 [1]
PR: ports/171404 [2]
PR: ports/171405 [3]
Submitted by: Yuan-Chung Hsiao <ychsiao@ychsiao.org> (maintainer) [1]
Submitted by: Joe Horn <joehorn@gmail.com> (maintainer) [2] [3]
Reviewed by: eadler [4]
Security: 30149157-f926-11e1-95cd-001fd0af1a4c |
1.1_1 06 Sep 2012 06:10:42 |
rea |
VuXML: add <modified> tag for Wireshark's entry for CVE-2012-3548 |
1.1_1 05 Sep 2012 16:02:11 |
marcus |
Change the wireshark version for the DRDA fix. |
1.1_1 05 Sep 2012 10:42:38 |
rea |
VuXML: document XSS in MoinMoin before 1.9.4 via RST parser |
1.1_1 05 Sep 2012 09:47:35 |
rea |
VuXML: document wrong group ACL processing in MoinMoin |
1.1_1 05 Sep 2012 06:29:39 |
rea |
PHP 5.x: document header splitting vulnerability
There is a related CVE number (CVE-2012-4388), but there is no current
consensus about it:
http://article.gmane.org/gmane.comp.security.oss.general/8303 |
1.1_1 04 Sep 2012 21:05:15 |
mandree |
Modify fetchmail vuln' URLs to established site.
While at it, adjust the two oldest topics to current format, for uniformity,
on, for instance, http://www.vuxml.org/freebsd/pkg-fetchmail.html. |
1.1_1 04 Sep 2012 13:45:28 |
rea |
security/squidclamav: fix DoS and XSS vulnerabilities
Apply upstream patches for CVE-2012-3501 and CVE-2012-4667.
Security: http://www.vuxml.org/freebsd/ce680f0a-eea6-11e1-8bd8-0022156e8794.html
Security: http://www.vuxml.org/freebsd/8defa0f9-ee8a-11e1-8bd8-0022156e8794.html
PR: 171022
QA page: http://codelabs.ru/fbsd/ports/qa/security/squidclamav/5.7_1
Approved by: maintainer timeout (1 week) |
1.1_1 02 Sep 2012 02:57:38 |
eadler |
Inform the community about a recent bitcoin DoS vuln.
Reviewed by: swills |
1.1_1 01 Sep 2012 20:16:06 |
ohauer |
- update bugzilla bugzilla3 and bugzilla42
- use new bugzilla@ address (members skv@, tota@, ohauer@)
- patch russian/japanese/german bugzilla and bugzilla templates
so the reflect the security updates in the original templates
- patch german/bugzilla42 templates
- adopt new Makefile header
vuxml: 6ad18fe5-f469-11e1-920d-20cf30e32f6d
CVE: CVE-2012-3981
https://bugzilla.mozilla.org/show_bug.cgi?id=785470
https://bugzilla.mozilla.org/show_bug.cgi?id=785522
https://bugzilla.mozilla.org/show_bug.cgi?id=785511 |
1.1_1 01 Sep 2012 18:50:14 |
rea |
VuXML: document CVE-2012-3534, DoS via large number of connections |
1.1_1 01 Sep 2012 17:40:16 |
eadler |
vuxml matches on PKGNAME, not on the port directory.
mediawiki118 has PKGNAME mediawiki-1.18.4 |
1.1_1 01 Sep 2012 17:16:50 |
rea |
Add "modified" tag to the Java 7 entry
Forgot to do it at r303435.
Spotted by: wxs
Pointyhat to: rea |
1.1_1 01 Sep 2012 12:44:33 |
wen |
- Update www/mediawiki to 1.19.2
- Update www/mediawiki118 to 1.18.5
- Document the security bugs |
1.1_1 31 Aug 2012 16:58:42 |
rea |
VuXML: update Java 7 entry with Oracle-provided details
Oracle's Java 7 update 7 fixes CVE-2012-4681. |
1.1_1 31 Aug 2012 15:17:13 |
mandree |
Tidy up paragraph formatting (it passed "make validate" before).
Suggested by: wxs |
1.1_1 31 Aug 2012 10:59:18 |
rea |
VuXML: document CVE-2012-3548, DoS in Wireshark |
1.1_1 30 Aug 2012 23:08:55 |
rene |
Document vulnerabilities in www/chromium < 21.0.1180.89
Obtained
from: http://googlechromereleases.blogspot.nl/search/label/Stable%20updates |
1.1_1 30 Aug 2012 22:14:11 |
flo |
- Update net/asterisk to 1.8.15.1
- Update net/asterisk10 to 10.7.1
- Document vulnerabilities in vuln.xml
- Fix URLs in the pervious asterisk vuln.xml entry
Security: http://www.vuxml.org/freebsd/4c53f007-f2ed-11e1-a215-14dae9ebcf89.html |
1.1_1 30 Aug 2012 11:40:20 |
jase |
- Update to 1.5.20
- Update MASTER_SITES
- Convert to optionsNG and add DOCS option
- Document security vulnerabilities [1]
PR: ports/169558
Requested by: Alexey <alexey@kouznetsov.com> (submitter)
Security: 6dd5e45c-f084-11e1-8d0f-406186f3d89d [1]
Approved by: flo (mentor) |
1.1_1 30 Aug 2012 09:03:22 |
rea |
VuXML: document CVE-2012-4681, security manager bypass in Java 7.x |
1.1_1 30 Aug 2012 06:23:21 |
mandree |
Add a vuln' entry for fetchmail's CVE-2011-3389 vulnerability. |
1.1_1 27 Aug 2012 17:44:23 |
mandree |
Update fetchmail to 6.3.21_1, fixing CVE-2012-3482.
Adjust VuXML database entry from < 6.3.22 to < 6.3.21_1.
PR: ports/170613
Approved by: maintainer timeout (14 days)
Security: http://www.vuxml.org/freebsd/83f9e943-e664-11e1-a66d-080027ef73ec.html
Security: CVE-2012-3482 |
1.1_1 26 Aug 2012 21:31:12 |
rea |
VuXML entry c906e0a4-efa6-11e1-8fbf-001b77d09812: fix port epoch
Pointyhat to: rea |
1.1_1 26 Aug 2012 21:26:57 |
rea |
VuXML: document XSS in RoundCube Web-mail application
Branch 0.8.x before 0.8.1 is prone to XSS attack via incoming
HTML messages. |
1.1_1 26 Aug 2012 17:33:12 |
rea |
news/inn: fix plaintext command injection, CVE-2012-3523
Relevant only for INN installations that are using encryption.
PR: 171013
Approved by: fluffy@FreeBSD.org (maintainer)
Security: http://www.vuxml.org/freebsd/a7975581-ee26-11e1-8bd8-0022156e8794.html |
1.1_1 26 Aug 2012 01:44:43 |
avilla |
- Document Calligra input validation failure. |
1.1_1 25 Aug 2012 22:17:29 |
bdrewery |
- Document that CVE-2012-3386 only affects automake >= 1.5.0
Verified this by inspecting the automake14 source, as well as
official release tarballs and git history.
Approved by: bapt (mentor) |
1.1_1 25 Aug 2012 11:38:00 |
rea |
VuXML: document cross-site scripting in SquidClamav |
1.1_1 25 Aug 2012 10:07:40 |
rea |
VuXML: document DoS in SquidGuard
SquidGuard can be crashed via the specially-crafted URL
when external URL checker is used. |
1.1_1 24 Aug 2012 20:13:53 |
rea |
VuXML: document INN plaintext command injection vulnerability |
1.1_1 22 Aug 2012 21:10:10 |
rea |
VuXML: document CVE-2012-3525 in jabberd 2.x |
1.1_1 22 Aug 2012 20:01:19 |
rea |
VuXML: fix whitespace in my previous rssh entry |
1.1_1 22 Aug 2012 20:00:31 |
rea |
VuXML: document rssh vulnerabilities fixed in version 2.3.3 |
1.1_1 21 Aug 2012 20:56:44 |
rea |
rssh: document arbitrary code execution, CVE-2012-3478 |
1.1_1 20 Aug 2012 01:40:39 |
wxs |
Put libotr entry back. I added the cited URL to the references. |
1.1_1 19 Aug 2012 21:47:46 |
dougb |
Remove the improperly formatted libotr entry. Someone with more knowledge
and experience needs to take care of this, I'm clearly not competent. |
1.1_1 18 Aug 2012 08:39:39 |
dougb |
14 August 2012 libotr version 3.2.1 released
Versions 3.2.0 and earlier of libotr contain a small heap write overrun
(thanks to Justin Ferguson for the report), and a large heap read overrun
(thanks to Ben Hawkes for the report).
Add a vuxml entry, and tune up the notes about adding a new entry. |
1.1_1 18 Aug 2012 03:07:42 |
wxs |
Document OpenTTD DoS. |