Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 May 2015 12:12:59 -0500
From:      Mark Felder <feld@FreeBSD.org>
To:        Bryan Drewery <bdrewery@FreeBSD.org>, Roger Marquis <marquis@roble.com>
Cc:        freebsd-ports@freebsd.org
Subject:   Re: New pkg audit / vuln.xml failures (php55, unzoo)
Message-ID:  <1432833179.3252451.280654489.257EAA21@webmail.messagingengine.com>
In-Reply-To: <55674903.4040202@FreeBSD.org>
References:  <alpine.BSF.2.11.1505171402430.52815@eboyr.pbz> <20150523153029.B7BD3280@hub.freebsd.org> <1432659389.3130746.278522905.6D1E6549@webmail.messagingengine.com> <20150527174037.EF719B11@hub.freebsd.org> <556746A4.4090208@FreeBSD.org> <55674903.4040202@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On Thu, May 28, 2015, at 11:57, Bryan Drewery wrote:
> On 5/28/2015 11:47 AM, Bryan Drewery wrote:
> > On 5/27/2015 12:40 PM, Roger Marquis wrote:
> ...
> 
> > This php one came up in the week and I almost
> > "just fixed it", but doing those things burns me out as I have my own
> > priorities.
> 
> Once of which is maintaining the package builders for FreeBSD.org. On
> the topic of security we used to only provide packages weekly, but have
> recently stepped up to almost-daily. I have been meaning to get a
> general announcement out about this.
> 

This is great news! I knew this was on the radar, but didn't know it was
happening yet. 

Thank you for your hard work!!!



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1432833179.3252451.280654489.257EAA21>