Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 25 Sep 2011 23:15:48 -0700
From:      Doug Barton <dougb@FreeBSD.org>
To:        "Philip M. Gollucci" <pgollucci@p6m7g8.com>
Cc:        freebsd-apache@freebsd.org
Subject:   Re: FreeBSD port(s) you maintain which are currently vulnerable
Message-ID:  <4E801894.6060907@FreeBSD.org>
In-Reply-To: <4E6642E0.5050101@p6m7g8.com>
References:  <4E621BDD.9000207@FreeBSD.org> <4E621D2C.2090204@FreeBSD.org> <4E6642E0.5050101@p6m7g8.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 09/06/2011 08:57, Philip M. Gollucci wrote:
> On 09/03/11 12:27, Doug Barton wrote:
>> /usr/ports/devel/apr0
>> /usr/ports/russian/apache13
>> /usr/ports/russian/apache13-modssl
>> /usr/ports/www/apache13-ssl
>> /usr/ports/www/apache20
> 
> We'll deal with these.

Thanks!

I see deprecated for:
russian/apache13
russian/apache13-modssl
www/apache13-ssl
www/apache20

Nothing for:
devel/apr0

Is that one going to be fixed?
Affected package: apr-0.9.19.0.9.19_1
Type of problem: apr -- multiple vulnerabilities.
Reference:
http://portaudit.FreeBSD.org/eb9212f7-526b-11de-bbf2-001b77d09812.html


Doug

-- 

	Nothin' ever doesn't change, but nothin' changes much.
			-- OK Go

	Breadth of IT experience, and depth of knowledge in the DNS.
	Yours for the right price.  :)  http://SupersetSolutions.com/




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E801894.6060907>