From owner-freebsd-ports-bugs@FreeBSD.ORG Mon Jan 21 07:00:08 2008 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1AAE616A418 for ; Mon, 21 Jan 2008 07:00:08 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 01A6D13C459 for ; Mon, 21 Jan 2008 07:00:08 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.2/8.14.2) with ESMTP id m0L707rH025114 for ; Mon, 21 Jan 2008 07:00:07 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.2/8.14.1/Submit) id m0L707Wf025113; Mon, 21 Jan 2008 07:00:07 GMT (envelope-from gnats) Date: Mon, 21 Jan 2008 07:00:07 GMT Message-Id: <200801210700.m0L707Wf025113@freefall.freebsd.org> To: freebsd-ports-bugs@FreeBSD.org From: Daniel Roethlisberger Cc: Subject: Re: ports/119844: security/nmap 4.53 has been released (we missed 4.21, 4.22, 4.23, 4.50, 4.51, 4.52 already) X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Daniel Roethlisberger List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Jan 2008 07:00:08 -0000 The following reply was made to PR ports/119844; it has been noted by GNATS. From: Daniel Roethlisberger To: bug-followup@FreeBSD.org Cc: dan@obluda.cz Subject: Re: ports/119844: security/nmap 4.53 has been released (we missed 4.21,4.22,4.23,4.50,4.51,4.52 already) Date: Mon, 21 Jan 2008 07:50:33 +0100 Please do NOT commit this PR. See ports/119673 with my maintainer update to 4.52. An update to 4.53 will follow after ports/119673 is committed and all went well. Thanks anyway for your work. If you think your patch handles anything I missed in ports/119673, please drop me an email. Just for the record, there have been no stable releases between 4.20 and 4.52, so we missed not a single one. Using nmap for professional work on a regular basis, reliability is more important to me than bleeding edge new features. Therefore, I am not too inclined to track unstable -ALPHA, -BETA, -RC, -SOC and -whatnot snapshots with the port. -- Daniel Roethlisberger