Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 2 May 2013 07:00:01 GMT
From:      strongswan <strongswan@Nanoteq.com>
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   RE: ports/178266: security/strongswan - CVE-2013-2944
Message-ID:  <201305020700.r42701M7040297@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/178266; it has been noted by GNATS.

From: strongswan <strongswan@Nanoteq.com>
To: "bug-followup@FreeBSD.org" <bug-followup@FreeBSD.org>
Cc: strongswan <strongswan@Nanoteq.com>
Subject: RE: ports/178266: security/strongswan - CVE-2013-2944
Date: Thu, 2 May 2013 08:51:06 +0200

 I tested the patch with strongSwan 5.0.4 and FreeBSD.
 The patch is approved and may be committed.
 
 Thank you.
 
 -----Original Message-----
 From: Edwin Groothuis [mailto:edwin@FreeBSD.org]
 Sent: 30 April 2013 08:50 PM
 To: strongswan
 Cc: bug-followup@FreeBSD.org
 Subject: Re: ports/178266: security/strongswan - CVE-2013-2944
 
 Maintainer of security/strongswan,
 
 Please note that PR ports/178266 has just been submitted.
 
 If it contains a patch for an upgrade, an enhancement or a bug fix you agre=
 e on, reply to this email stating that you approve the patch and a committe=
 r will take care of it.
 
 The full text of the PR can be found at:
     http://www.freebsd.org/cgi/query-pr.cgi?pr=3Dports/178266
 
 --
 Edwin Groothuis via the GNATS Auto Assign Tool edwin@FreeBSD.org
 
 
 
 Important Notice:
 
 This e-mail and its contents are subject to the Nanoteq (Pty) Ltd e-mail le=
 gal notice available at:
 http://www.nanoteq.com/AboutUs/EmailDisclaimer.aspx
 
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201305020700.r42701M7040297>