From owner-freebsd-ports-bugs@FreeBSD.ORG Tue Jan 31 14:44:51 2006 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9D84916A420; Tue, 31 Jan 2006 14:44:51 +0000 (GMT) (envelope-from barner@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id D21C643D6B; Tue, 31 Jan 2006 14:44:43 +0000 (GMT) (envelope-from barner@FreeBSD.org) Received: from freefall.freebsd.org (barner@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id k0VEihgt059719; Tue, 31 Jan 2006 14:44:43 GMT (envelope-from barner@freefall.freebsd.org) Received: (from barner@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id k0VEiheq059715; Tue, 31 Jan 2006 14:44:43 GMT (envelope-from barner) Date: Tue, 31 Jan 2006 14:44:43 GMT From: Simon Barner Message-Id: <200601311444.k0VEiheq059715@freefall.freebsd.org> To: barner@FreeBSD.org, freebsd-ports-bugs@FreeBSD.org, simon@FreeBSD.org Cc: Subject: Re: ports/92359: [MAINTAINER] net-im/kpopup: FORBIDDEN (local root exploit); contains the VuXML entry X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 31 Jan 2006 14:44:51 -0000 Synopsis: [MAINTAINER] net-im/kpopup: FORBIDDEN (local root exploit); contains the VuXML entry Responsible-Changed-From-To: freebsd-ports-bugs->simon Responsible-Changed-By: barner Responsible-Changed-When: Tue Jan 31 14:42:44 UTC 2006 Responsible-Changed-Why: You seem to be handling the VuXML entry, so I'll assign this PR to you. I'll handle ports/92554 which contains an update that fixes the security problem pointed out in this PR. http://www.freebsd.org/cgi/query-pr.cgi?pr=92359