Date: Fri, 23 Jan 2009 18:35:26 -0800 From: Xin LI <delphij@delphij.net> To: =?UTF-8?B?TXVuZWNoaWthIFNVTUlLQVdBIC8g6KeS5bed5a6X6L+R?= <sumikawa@FreeBSD.ORG> Cc: sumikawa@alaxala.net, apache@FreeBSD.ORG, secteam@FreeBSD.ORG Subject: Re: update request for ports/security/vuxml/vuln.xml Message-ID: <497A7E6E.70006@delphij.net> In-Reply-To: <20090123.194139.209849139.sumikawa@alaxala.net> References: <20090123.194139.209849139.sumikawa@alaxala.net>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Munechika SUMIKAWA / 角川宗近 wrote: > The below two vulnerability info for ports/www/apache13+ipv6 was not > updated for a few years. > http://www.freebsd.org/ports/portaudit/9fff8dc8-7aa7-11da-bf72-00123f589060.html > http://www.freebsd.org/ports/portaudit/651996e0-fe07-11d9-8329-000e0c2e438a.html > > The both must be fixed in apache13+ipv6-1.3.37 > http://www.freebsd.org/cgi/cvsweb.cgi/ports/www/apache13+ipv6/Makefile.diff?r1=1.50;r2=1.51 > > please review the below patch and update ports/security/vuxml/vuln.xml. I have checked and committed the change (with modification date added). Thanks for your submission! Cheers, - -- Xin LI <delphij@delphij.net> http://www.delphij.net/ FreeBSD - The Power to Serve! -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.10 (FreeBSD) iEYEARECAAYFAkl6fm0ACgkQi+vbBBjt66CzSwCfSmF+BaJP3AsprBHXzKRgFZSx +b0Anjfzdg1Yi9KqWHOavWkChbLCVwZe =rb+G -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?497A7E6E.70006>