Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 23 Jan 2009 18:35:26 -0800
From:      Xin LI <delphij@delphij.net>
To:        =?UTF-8?B?TXVuZWNoaWthIFNVTUlLQVdBIC8g6KeS5bed5a6X6L+R?= <sumikawa@FreeBSD.ORG>
Cc:        sumikawa@alaxala.net, apache@FreeBSD.ORG, secteam@FreeBSD.ORG
Subject:   Re: update request for ports/security/vuxml/vuln.xml
Message-ID:  <497A7E6E.70006@delphij.net>
In-Reply-To: <20090123.194139.209849139.sumikawa@alaxala.net>
References:  <20090123.194139.209849139.sumikawa@alaxala.net>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Munechika SUMIKAWA / 角川宗近 wrote:
> The below two vulnerability info for ports/www/apache13+ipv6 was not
> updated for a few years.
> 	http://www.freebsd.org/ports/portaudit/9fff8dc8-7aa7-11da-bf72-00123f589060.html
> 	http://www.freebsd.org/ports/portaudit/651996e0-fe07-11d9-8329-000e0c2e438a.html
> 
> The both must be fixed in apache13+ipv6-1.3.37
> 	http://www.freebsd.org/cgi/cvsweb.cgi/ports/www/apache13+ipv6/Makefile.diff?r1=1.50;r2=1.51
> 
> please review the below patch and update ports/security/vuxml/vuln.xml.

I have checked and committed the change (with modification date added).
 Thanks for your submission!

Cheers,
- --
Xin LI <delphij@delphij.net>	http://www.delphij.net/
FreeBSD - The Power to Serve!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.10 (FreeBSD)

iEYEARECAAYFAkl6fm0ACgkQi+vbBBjt66CzSwCfSmF+BaJP3AsprBHXzKRgFZSx
+b0Anjfzdg1Yi9KqWHOavWkChbLCVwZe
=rb+G
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?497A7E6E.70006>