From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Dec 14 10:56:26 2006 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id E6FAB16A4C2; Thu, 14 Dec 2006 10:56:26 +0000 (UTC) (envelope-from miwi@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [69.147.83.40]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5F54F43CBD; Thu, 14 Dec 2006 10:52:46 +0000 (GMT) (envelope-from miwi@FreeBSD.org) Received: from freefall.freebsd.org (miwi@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id kBEAsFCw058838; Thu, 14 Dec 2006 10:54:15 GMT (envelope-from miwi@freefall.freebsd.org) Received: (from miwi@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id kBEAsFt5058834; Thu, 14 Dec 2006 10:54:15 GMT (envelope-from miwi) Date: Thu, 14 Dec 2006 10:54:15 GMT From: Martin Wilke Message-Id: <200612141054.kBEAsFt5058834@freefall.freebsd.org> To: tota@rtfm.jp, miwi@FreeBSD.org, freebsd-ports-bugs@FreeBSD.org Cc: Subject: Re: ports/106710: [MAINTAINER] www/tdiary-devel: patch to 2.1.4_1 in order to fix eRuby Injection Vulnerability X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 14 Dec 2006 10:56:27 -0000 Synopsis: [MAINTAINER] www/tdiary-devel: patch to 2.1.4_1 in order to fix eRuby Injection Vulnerability State-Changed-From-To: open->closed State-Changed-By: miwi State-Changed-When: Thu Dec 14 10:54:13 UTC 2006 State-Changed-Why: duplicatet by pr 106686. http://www.vuxml.org/freebsd/fefd93d8-8af5-11db-9d01-0016179b2dd5.html VUXML is ready. http://www.freebsd.org/cgi/query-pr.cgi?pr=106710