From owner-freebsd-questions@FreeBSD.ORG Wed Jul 27 21:08:15 2005 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 8EE8516A41F; Wed, 27 Jul 2005 21:08:15 +0000 (GMT) (envelope-from virenp@mail.utexas.edu) Received: from smtp.cm.utexas.edu (smtp.cm.utexas.edu [146.6.135.3]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3ED9443D48; Wed, 27 Jul 2005 21:08:15 +0000 (GMT) (envelope-from virenp@mail.utexas.edu) Received: from mail.cm.utexas.edu (smtp.cm.utexas.edu [146.6.135.3]) by smtp.cm.utexas.edu (Postfix) with ESMTP id A615D6D48F; Wed, 27 Jul 2005 16:08:14 -0500 (CDT) Received: from 146.6.178.5 (SquirrelMail authenticated user vpatel) by mail.cm.utexas.edu with HTTP; Wed, 27 Jul 2005 16:08:14 -0500 (CDT) Message-ID: <37675.146.6.178.5.1122498494.squirrel@mail.cm.utexas.edu> Date: Wed, 27 Jul 2005 16:08:14 -0500 (CDT) From: "Viren Patel" To: freebsd-questions@freebsd.org, freebsd-ports@freebsd.org User-Agent: SquirrelMail/1.4.5 MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal Cc: Subject: apache13-modssl-1.3.33+2.8.22_1 port broken?? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: virenp@mail.utexas.edu List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 27 Jul 2005 21:08:15 -0000 I am trying to install apache+mod_ssl-1.3.33+2.8.22_1 and get the following: #make ===> apache+mod_ssl-1.3.33+2.8.22_1 has known vulnerabilities: => apache -- http request smuggling. Reference: => Please update your ports tree and try again. *** Error code 1 Stop in /usr/ports/www/apache13-modssl. I have updated the ports tree and the files directory contains the patch for this vulnerability (patch-secfix-CAN-2005-2088). I need to install this port urgently. What am I doing wrong?? If the vulnerability has not been fixed, how can I force install? TIA. -- Viren