Date: Tue, 31 Jul 2007 10:51:04 -0600 (MDT) From: "John E. Hein" <jhein@timing.com> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/115091: update vuxml entry for seamonkey 1.1.3 Message-ID: <200707311651.l6VGp4qa084324@gromit.timing.com> Resent-Message-ID: <200707311700.l6VH05bp066583@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 115091 >Category: ports >Synopsis: update vuxml entry for seamonkey 1.1.3 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Tue Jul 31 17:00:04 GMT 2007 >Closed-Date: >Last-Modified: >Originator: John E. Hein >Release: FreeBSD 6.2-STABLE i386 >Organization: >Environment: System: FreeBSD gromit.timing.com 6.2-STABLE FreeBSD 6.2-STABLE #0: Fri Jul 27 22:41:05 MDT 2007 jhein@bugs.timing.com:/usr/obj/usr/src/sys/GROMIT i386 >Description: This vuxml entry... http://www.vuxml.org/freebsd/e190ca65-3636-11dc-a697-000c6ec775d9.html ... can be updated to apply to *seamonkey* < 1.1.3 All the MFSAs listed there are now shown as fixed for SM 1.1.3 ... http://www.mozilla.org/projects/security/known-vulnerabilities.html#SeaMonkey >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200707311651.l6VGp4qa084324>