Date: Tue, 16 May 2006 22:12:25 +0200 (SAST) From: Greg Armer <wiqd@codelounge.co.za> To: FreeBSD-gnats-submit@FreeBSD.org Cc: wiqd@codelounge.co.za Subject: ports/97364: [update] www/awstats to 6.6 Message-ID: <200605162012.k4GKCPZG024593@ws.propdata.co.za> Resent-Message-ID: <200605162010.k4GKACBN020522@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 97364 >Category: ports >Synopsis: [update] www/awstats to 6.6 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Tue May 16 20:10:12 GMT 2006 >Closed-Date: >Last-Modified: >Originator: Greg Armer <wiqd@codelounge.co.za> >Release: FreeBSD 5.4-STABLE i386 >Organization: Code Lounge >Environment: System: FreeBSD ws.propdata.co.za 5.4-STABLE FreeBSD 5.4-STABLE #0: Mon Apr 18 13:32:36 SAST 2005 root@ws.propdata.co.za:/usr/obj/usr/src/sys/WS i386 >Description: Update released by AWStats fixing current command injection vulnerability. http://awstats.sourceforge.net/awstats_security_news.php >How-To-Repeat: >Fix: Update Port. Thanks. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200605162012.k4GKCPZG024593>