From owner-freebsd-apache@freebsd.org Mon Aug 10 20:05:55 2020 Return-Path: Delivered-To: freebsd-apache@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9F7403AD6F6 for ; Mon, 10 Aug 2020 20:05:55 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4BQRmM3pw1z4lnP for ; Mon, 10 Aug 2020 20:05:55 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id 812AC3ADE83; Mon, 10 Aug 2020 20:05:55 +0000 (UTC) Delivered-To: apache@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 80F433ADAEF for ; Mon, 10 Aug 2020 20:05:55 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: from toco-domains.de (mail.toco-domains.de [176.9.100.27]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BQRmM1DMCz4lnN for ; Mon, 10 Aug 2020 20:05:54 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: by toco-domains.de (Postfix, from userid 65534) id E143210CF5F; Mon, 10 Aug 2020 22:05:52 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on toco-mail X-Spam-Level: X-Spam-Status: No, score=-2.9 required=4.0 tests=ALL_TRUSTED,BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 Received: from Jochens-MacBook-Pro.local (p5b0fd9ea.dip0.t-ipconnect.de [91.15.217.234]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by toco-domains.de (Postfix) with ESMTPSA id B1FDD10CF4B; Mon, 10 Aug 2020 22:05:49 +0200 (CEST) Subject: Re: Apache24 vulnerability To: Jos Chrispijn , apache@freebsd.org References: <107d7d42-39b6-1f30-b5fd-ff9b69fa8691@cloudzeeland.nl> From: Jochen Neumeister Message-ID: Date: Mon, 10 Aug 2020 22:05:48 +0200 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 In-Reply-To: <107d7d42-39b6-1f30-b5fd-ff9b69fa8691@cloudzeeland.nl> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: de-DE X-Rspamd-Queue-Id: 4BQRmM1DMCz4lnN X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; ASN(0.00)[asn:24940, ipnet:176.9.0.0/16, country:DE] X-BeenThere: freebsd-apache@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Support of apache-related ports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Aug 2020 20:05:55 -0000 Apache is already available in version 2.4.46: https://svnweb.freebsd.org/ports?view=revision&revision=544237 Greetings Am 10.08.20 um 20:03 schrieb Jos Chrispijn: > Dear package maintainer(s), > > Hope you are in good health and have a good holiday with this pandemic > going on. > > Can you please send out an update of following packageas > apache24-2.4.43 seems to be vulnerable: > > Apache httpd -- Multiple vulnerabilities CVE: CVE-2020-11993 CVE: > CVE-2020-11984 CVE: CVE-2020-9490 WWW: > https://vuxml.FreeBSD.org/freebsd/76700d2f-d959-11ea-b53c-d4c9ef517024.html > thanks in advance and keep up the good wojk! Jos > > _______________________________________________ > freebsd-apache@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-apache > To unsubscribe, send any mail to "freebsd-apache-unsubscribe@freebsd.org"