First of all, let me start by saying that I don't want to downplay the recent security issues found by James. I actually had an item "check that we don't trust values from cookies too much" on my to-do list for quite a long time, which makes this all the more embarrassing.
But I think you're overstating things a bit when you say that "almost at regular interval security flaws are being detected". Let's have a look over the recent security issues:
1.4.0sr1 [2006-02-19]
A serious one, no doubt. Technically, it's the combination of two minor flaws that results in a big one. Needs a somewhat sophisticated attack to exploit, but the consequences are frightening.
1.3.11sr3 [2005-12-18]
Two minor flaws. The one about being able to post comments to stories you can't see could be considered merely an annoyance, but since it's bypassing our permission system, we filed it under security. Still, there's no way that this could be used to do any serious harm to your site.
The other issue is an "information leakage". It was possible to find out in which path your Geeklog install resides on your server. Not an immediate problem, but the information you could gather that way could come in handy for other attacks.
1.3.11sr2 [2005-10-08]
The important one in this release was the introduction of a speed limit on login attempts. This is to slow down dictionary attacks. A good password will always be a much more effective protection against those, but we shouldn't make the attacker's life any easier nonetheless.
All the other changes in this release were about spam protection. Spam is annoying but not a security issue per se and not something that can seriously damage your site.
1.3.11sr1 [2005-07-03]
That was another big one, no doubt.
So, let's see: We've had a serious issue right now, a medium-risk issue four months ago, and another serious issue seven months ago. That's not as good as I'd like it to be, but not that bad either. I don't want to use the old "at least we're not as bad as the others" excuse, but if you do compare the track record of other open source or commercial projects, you'll find us in good company. Try reading Bugtraq for a while to get a feel for the frequency of occurence of security issues in certain products.
To phrase it the other way around: It is because we do take security seriously that we release security updates relatively often. We'd rather release a fix for a minor issue ASAP than put our users and their sites at risk.
Now, the issue of updates. We always provide support for the current version plus the previous one (currently 1.4.0 and 1.3.11). We do provide upgrades that are usually just drop-in replacements, i.e. upload the fixed files and you're done. This, I would guess, works just fine for more than 90% of our users.
When you modify Geeklog's core code, obviously, you'll have more work to do to merge in those changes. We generally discourage modification of the core code and do our best to provide lots of hooks for custom code (plugin API, lib-custom.php, etc.). If you think there's a hook missing somewhere, talk to us and we'll see what we can do.
But you have to understand that you're on your own when you modify our code. Still, if you're able to modify the code, you should also be able to figure out our fixes. Our
CVS web frontend, for example, has that handy diff feature that will highlight changes in the files.
If, to pick up your example, you insist on staying with your modified version of 1.3.11sr1 you can download the 1.3.11sr4 upgrade and compare the files in there with your copies. You'll find that the modifications are restricted to certain areas of the code (e.g. in lib-common.php), so with the PHP knowledge that you obviously have, it should be easy to merge your modifications and ours.
bye, Dirk