Date: Thu, 2 May 2013 07:00:01 GMT From: strongswan <strongswan@Nanoteq.com> To: freebsd-ports-bugs@FreeBSD.org Subject: RE: ports/178266: security/strongswan - CVE-2013-2944 Message-ID: <201305020700.r42701M7040297@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/178266; it has been noted by GNATS. From: strongswan <strongswan@Nanoteq.com> To: "bug-followup@FreeBSD.org" <bug-followup@FreeBSD.org> Cc: strongswan <strongswan@Nanoteq.com> Subject: RE: ports/178266: security/strongswan - CVE-2013-2944 Date: Thu, 2 May 2013 08:51:06 +0200 I tested the patch with strongSwan 5.0.4 and FreeBSD. The patch is approved and may be committed. Thank you. -----Original Message----- From: Edwin Groothuis [mailto:edwin@FreeBSD.org] Sent: 30 April 2013 08:50 PM To: strongswan Cc: bug-followup@FreeBSD.org Subject: Re: ports/178266: security/strongswan - CVE-2013-2944 Maintainer of security/strongswan, Please note that PR ports/178266 has just been submitted. If it contains a patch for an upgrade, an enhancement or a bug fix you agre= e on, reply to this email stating that you approve the patch and a committe= r will take care of it. The full text of the PR can be found at: http://www.freebsd.org/cgi/query-pr.cgi?pr=3Dports/178266 -- Edwin Groothuis via the GNATS Auto Assign Tool edwin@FreeBSD.org Important Notice: This e-mail and its contents are subject to the Nanoteq (Pty) Ltd e-mail le= gal notice available at: http://www.nanoteq.com/AboutUs/EmailDisclaimer.aspx
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201305020700.r42701M7040297>