From owner-freebsd-isp@FreeBSD.ORG Mon Jun 14 07:16:49 2004 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0675C16A4CE for ; Mon, 14 Jun 2004 07:16:49 +0000 (GMT) Received: from hermes.aboutit.co.za (nat.aboutit.co.za [196.23.168.10]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9ABA143D41 for ; Mon, 14 Jun 2004 07:16:45 +0000 (GMT) (envelope-from mark@aboutit.co.za) Received: by hermes.aboutit.co.za (Postfix, from userid 65534) id 5B5B973BCA; Mon, 14 Jun 2004 08:05:54 +0200 (SAST) Received: from localhost (localhost [127.0.0.1]) by hermes.aboutit.co.za (Postfix) with ESMTP id CCA8873BC2 for ; Mon, 14 Jun 2004 08:05:52 +0200 (SAST) Received: from [10.10.10.10] (mark.aboutit.co.za [10.10.10.10]) by hermes.aboutit.co.za (Postfix) with ESMTP id 704F56D88A for ; Mon, 14 Jun 2004 08:05:52 +0200 (SAST) From: Mark Bojara To: freebsd-isp@freebsd.org In-Reply-To: <375DD163B075E34EA3C10A6286E34A545489E6@exhsto1.se.dataphone.com> References: <375DD163B075E34EA3C10A6286E34A545489E6@exhsto1.se.dataphone.com> Content-Type: text/plain Message-Id: <1087193170.42134.23.camel@mark.aboutit.co.za> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.4.5 Date: Mon, 14 Jun 2004 08:06:11 +0200 Content-Transfer-Encoding: 7bit X-Virus-Scanned: by AMaViS snapshot-20020531 X-Spam-Status: No, hits=-3.7 required=5.0 tests=AWL,IN_REP_TO,REFERENCES,USER_AGENT_XIMIAN autolearn=ham version=2.55 X-Spam-Level: X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp) Subject: apache13 security problems X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Jun 2004 07:16:49 -0000 Hello All, Since this weekend new security holes in apache1.3.31 have been discovered. However I have cvsupped my ports collection from both cvsup2.freebsd.org and cvsup.ca.freebsd.org and there arent any changes in the cvs tree for www/apache13 ===> apache-1.3.31_1 has known vulnerabilities: >> mod_ssl stack-based buffer overflow. Reference: >> Please update your ports tree and try again. *** Error code 1 Does anybody have advise on how I could sort this out? Regards Mark