Date: Sun, 25 Sep 2011 23:15:48 -0700 From: Doug Barton <dougb@FreeBSD.org> To: "Philip M. Gollucci" <pgollucci@p6m7g8.com> Cc: freebsd-apache@freebsd.org Subject: Re: FreeBSD port(s) you maintain which are currently vulnerable Message-ID: <4E801894.6060907@FreeBSD.org> In-Reply-To: <4E6642E0.5050101@p6m7g8.com> References: <4E621BDD.9000207@FreeBSD.org> <4E621D2C.2090204@FreeBSD.org> <4E6642E0.5050101@p6m7g8.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 09/06/2011 08:57, Philip M. Gollucci wrote: > On 09/03/11 12:27, Doug Barton wrote: >> /usr/ports/devel/apr0 >> /usr/ports/russian/apache13 >> /usr/ports/russian/apache13-modssl >> /usr/ports/www/apache13-ssl >> /usr/ports/www/apache20 > > We'll deal with these. Thanks! I see deprecated for: russian/apache13 russian/apache13-modssl www/apache13-ssl www/apache20 Nothing for: devel/apr0 Is that one going to be fixed? Affected package: apr-0.9.19.0.9.19_1 Type of problem: apr -- multiple vulnerabilities. Reference: http://portaudit.FreeBSD.org/eb9212f7-526b-11de-bbf2-001b77d09812.html Doug -- Nothin' ever doesn't change, but nothin' changes much. -- OK Go Breadth of IT experience, and depth of knowledge in the DNS. Yours for the right price. :) http://SupersetSolutions.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E801894.6060907>