From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Oct 19 14:01:04 2006 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id E4A7D16A4F4; Thu, 19 Oct 2006 14:01:04 +0000 (UTC) (envelope-from edwin@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9DE4743D58; Thu, 19 Oct 2006 14:01:04 +0000 (GMT) (envelope-from edwin@FreeBSD.org) Received: from freefall.freebsd.org (edwin@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id k9JE14LO044580; Thu, 19 Oct 2006 14:01:04 GMT (envelope-from edwin@freefall.freebsd.org) Received: (from edwin@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id k9JE14tM044576; Thu, 19 Oct 2006 14:01:04 GMT (envelope-from edwin) Date: Thu, 19 Oct 2006 14:01:04 GMT From: Edwin Groothuis Message-Id: <200610191401.k9JE14tM044576@freefall.freebsd.org> To: edwin@FreeBSD.org, freebsd-ports-bugs@FreeBSD.org, sobomax@FreeBSD.org Cc: Subject: Re: ports/104567: [PATCH] net/asterisk: update to 1.2.13 (fixes remote execute security hole) X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 Oct 2006 14:01:05 -0000 Synopsis: [PATCH] net/asterisk: update to 1.2.13 (fixes remote execute security hole) Responsible-Changed-From-To: freebsd-ports-bugs->sobomax Responsible-Changed-By: edwin Responsible-Changed-When: Thu Oct 19 14:01:03 UTC 2006 Responsible-Changed-Why: Over to maintainer http://www.freebsd.org/cgi/query-pr.cgi?pr=104567