From owner-cvs-ports@FreeBSD.ORG Tue Jun 21 22:08:22 2005 Return-Path: X-Original-To: cvs-ports@freebsd.org Delivered-To: cvs-ports@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 56DE216A41C; Tue, 21 Jun 2005 22:08:22 +0000 (GMT) (envelope-from nik@freebsd.org) Received: from jc.ngo.org.uk (jc.ngo.org.uk [69.55.225.33]) by mx1.FreeBSD.org (Postfix) with ESMTP id 38BAD43D5E; Tue, 21 Jun 2005 22:08:22 +0000 (GMT) (envelope-from nik@freebsd.org) Received: from crf-consulting.co.uk (82-44-220-218.cable.ubr10.haye.blueyonder.co.uk [82.44.220.218]) by jc.ngo.org.uk (8.13.4/8.13.4) with ESMTP id j5LM8JDd086030; Tue, 21 Jun 2005 15:08:20 -0700 (PDT) (envelope-from nik@freebsd.org) Received: from [192.168.1.21] ([192.168.1.21]) by crf-consulting.co.uk (8.13.1/8.12.9) with ESMTP id j5LM8IKD052145; Tue, 21 Jun 2005 23:08:18 +0100 (BST) (envelope-from nik@freebsd.org) Message-ID: <42B88F54.8040904@freebsd.org> Date: Tue, 21 Jun 2005 23:06:12 +0100 From: Nik Clayton User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Oliver Lehmann , ports-committers@freebsd.org, cvs-ports@freebsd.org, cvs-all@freebsd.org References: <200506212047.j5LKlUur072809@repoman.freebsd.org> <20050621225037.408d9dcc.lehmann@ans-netz.de> In-Reply-To: <20050621225037.408d9dcc.lehmann@ans-netz.de> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: * (1.792) RCVD_IN_NJABL_DUL,RCVD_IN_SORBS_DUL X-Scanned-By: MIMEDefang 2.51 on 69.55.225.33 Cc: Subject: Re: cvs commit: ports/mail/squirrelmail Makefile distinfo X-BeenThere: cvs-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Jun 2005 22:08:22 -0000 Oliver Lehmann wrote: >> Modified files: >> mail/squirrelmail Makefile distinfo >> Log: >> Use a vendor-provided patch for a XSS vulnerability until 1.4.5 is >> released. Bump PORT_REVISION accordingly. > > can 82410 be closed then? Yeah, just done so. I didn't check the PR database when portaudit threw up the problem. I must remember to do that... N