From owner-cvs-all@FreeBSD.ORG Thu Mar 1 18:34:07 2007 Return-Path: X-Original-To: cvs-all@FreeBSD.org Delivered-To: cvs-all@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 17F9F16A408; Thu, 1 Mar 2007 18:34:07 +0000 (UTC) (envelope-from simon@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [69.147.83.41]) by mx1.freebsd.org (Postfix) with ESMTP id B717813C4BB; Thu, 1 Mar 2007 18:34:06 +0000 (UTC) (envelope-from simon@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.6/8.13.6) with ESMTP id l21IY6ja050945; Thu, 1 Mar 2007 18:34:06 GMT (envelope-from simon@repoman.freebsd.org) Received: (from simon@localhost) by repoman.freebsd.org (8.13.6/8.13.4/Submit) id l21IY6aZ050944; Thu, 1 Mar 2007 18:34:06 GMT (envelope-from simon) Message-Id: <200703011834.l21IY6aZ050944@repoman.freebsd.org> From: "Simon L. Nielsen" Date: Thu, 1 Mar 2007 18:34:06 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/security/vuxml vuln.xml X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Mar 2007 18:34:07 -0000 simon 2007-03-01 18:34:06 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: For recent "mozilla -- multiple vulnerabilities" entry: - Mark Seamonkey 1.1.1 as safe. While mozilla.org does not clearly state this, it does seem to be the case. [1] - Add another critical vulnerability which wasn't on the web site when the vuxml entry was initially added. Reported by: Volodymyr Kostyrko [1] Revision Changes Path 1.1285 +6 -3 ports/security/vuxml/vuln.xml