Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Sep 2005 13:55:02 +0200
From:      "Simon L. Nielsen" <simon@FreeBSD.org>
To:        Huynh Van Chung <chung@hslab.ees.saitama-u.ac.jp>
Cc:        freebsd-apache@freebsd.org, security@freebsd.org
Subject:   Re: About apache vulnerability CAN-2005-2728
Message-ID:  <20050908115502.GB78024@eddie.nitro.dk>
In-Reply-To: <009c01c5b46b$764b16a0$c6012685@postitec11>
References:  <009c01c5b46b$764b16a0$c6012685@postitec11>

next in thread | previous in thread | raw e-mail | index | archive | help

--xHFwDpU9dbj6ez1V
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On 2005.09.08 20:50:08 +0900, Huynh Van Chung wrote:

> I see the CAN-2005-2728 is not yet patched to apache ports(last updated=
=20
> with CAN-2005-2088)

It is patched in the apache2 port version 2.0.54_3 (check the
references).  The commit message just didn't mention that CVE name,
since it was not known to us at the time.

--=20
Simon L. Nielsen
FreeBSD Security Team

--xHFwDpU9dbj6ez1V
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (FreeBSD)

iD8DBQFDICaVh9pcDSc1mlERAsqAAKDJYMV8LoNGVpewE1fGf6ia6zO+lgCePyDZ
zdIWJTRnNY+mOAmGN+4BKlY=
=v20R
-----END PGP SIGNATURE-----

--xHFwDpU9dbj6ez1V--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050908115502.GB78024>