Date: Thu, 28 May 2015 12:12:59 -0500 From: Mark Felder <feld@FreeBSD.org> To: Bryan Drewery <bdrewery@FreeBSD.org>, Roger Marquis <marquis@roble.com> Cc: freebsd-ports@freebsd.org Subject: Re: New pkg audit / vuln.xml failures (php55, unzoo) Message-ID: <1432833179.3252451.280654489.257EAA21@webmail.messagingengine.com> In-Reply-To: <55674903.4040202@FreeBSD.org> References: <alpine.BSF.2.11.1505171402430.52815@eboyr.pbz> <20150523153029.B7BD3280@hub.freebsd.org> <1432659389.3130746.278522905.6D1E6549@webmail.messagingengine.com> <20150527174037.EF719B11@hub.freebsd.org> <556746A4.4090208@FreeBSD.org> <55674903.4040202@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, May 28, 2015, at 11:57, Bryan Drewery wrote: > On 5/28/2015 11:47 AM, Bryan Drewery wrote: > > On 5/27/2015 12:40 PM, Roger Marquis wrote: > ... > > > This php one came up in the week and I almost > > "just fixed it", but doing those things burns me out as I have my own > > priorities. > > Once of which is maintaining the package builders for FreeBSD.org. On > the topic of security we used to only provide packages weekly, but have > recently stepped up to almost-daily. I have been meaning to get a > general announcement out about this. > This is great news! I knew this was on the radar, but didn't know it was happening yet. Thank you for your hard work!!!
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1432833179.3252451.280654489.257EAA21>