Date: Fri, 17 Jul 2015 10:17:11 +0200 From: Erwin Lansing <erwin@FreeBSD.org> To: Alex Dupre <ale@FreeBSD.org> Cc: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: Re: svn commit: r392140 - head/databases/mysql56-server Message-ID: <20150717081711.GS63119@droso.dk> In-Reply-To: <201507151349.t6FDn5Sf079974@svnmir.geo.freebsd.org> References: <201507151349.t6FDn5Sf079974@svnmir.geo.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--veXX9dWIonWZEC6h Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Jul 15, 2015 at 01:49:05PM +0000, Alex Dupre wrote: > Author: ale > Date: Wed Jul 15 13:49:04 2015 > New Revision: 392140 > URL: https://svnweb.freebsd.org/changeset/ports/392140 >=20 > Log: > Update to 5.6.25 release. Does this by any change fix this vulnerability? http://www.vuxml.org/freebsd/36bd352d-299b-11e5-86ff-14dae9d210b8.html If so, could you update the VuXML entry and MFH the update? Thanks, Erwin --veXX9dWIonWZEC6h Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEVAwUBVai6B1F75hSlwe7HAQpwtwf/cTwqa2fXUda8RaasB6lUEZzwgtnEzUN7 6LrX+zb3gZJzEFciBi47ovA4ByTt6rWQcQVDRO9ClxUD2nVPLnoB8TIFunhOeh4R Cd6SgcL3C3AOlO76tXAbKn8wsVtP+HKB+Nuc3pCwnb/4J2e/sGgUHBgyq8HFg3wa c/wR+oz//4mOemjwOI41+6TaWvvHhASaJZ5fN6XlPiG1NItBDykpr7v6tU6kDPsN bmQEz1e9VsC6+Kp/ekt2WaDRvKLo9ENoqwPOT2BdA2sDwiw0HdxkIek52t6Itlxc 5XbOnLs+X2oLOV20ZV5Ixv4QcktCuYuGOXbiTP3RMKJiQF0jgbigWQ== =VMuy -----END PGP SIGNATURE----- --veXX9dWIonWZEC6h--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150717081711.GS63119>