Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 18 Mar 2010 17:41:22 -0000
From:      "Chris" <chris@chrysalisnet.org>
To:        "'Philip M. Gollucci'" <pgollucci@p6m7g8.com>
Cc:        apache@freebsd.org
Subject:   RE: FreeBSD Port: www/apache22
Message-ID:  <029401cac6c2$39f05fd0$add11f70$@org>
In-Reply-To: <4BA264C6.80903@p6m7g8.com>
References:  <020701cac555$9f1c3b40$dd54b1c0$@org> <4BA01237.30500@p6m7g8.com> <4BA01288.8090206@p6m7g8.com> <020c01cac55f$ef4a0110$cdde0330$@org> <4BA01526.30809@p6m7g8.com> <020e01cac562$6d84b140$488e13c0$@org> <4BA01A20.4070804@p6m7g8.com> <028701cac6a9$c22cd090$468671b0$@org> <4BA264C6.80903@p6m7g8.com>

next in thread | previous in thread | raw e-mail | index | archive | help
enjoy your vacation :)

yes I will double check if I am using those modules and I think I am not.

-----Original Message-----
From: Philip M. Gollucci [mailto:pgollucci@p6m7g8.com] 
Sent: 18 March 2010 17:37
To: Chris
Cc: apache@freebsd.org
Subject: Re: FreeBSD Port: www/apache22

On 3/18/2010 10:46 AM, Chris wrote:
> hi again.
> 
> is it not possible to bump apache without updating apr? using the same apr
Yes, but it is untested.

> as in 2.2.14?  I see 4 security notices against 2.2.14 which makes me
> worried.  I thought freebsd ports allowed commits for security reasons
> during a freeze/slush.
Yes, they do.

I'd wagger you're not using any of the modules that are vulnerable.

If you are really in a rush, you are welcome to submit patches.

As for me, back to vacation!



__________ Information from ESET NOD32 Antivirus, version of virus signature
database 4955 (20100318) __________

The message was checked by ESET NOD32 Antivirus.

http://www.eset.com






Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?029401cac6c2$39f05fd0$add11f70$>