Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Jul 2015 10:17:11 +0200
From:      Erwin Lansing <erwin@FreeBSD.org>
To:        Alex Dupre <ale@FreeBSD.org>
Cc:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   Re: svn commit: r392140 - head/databases/mysql56-server
Message-ID:  <20150717081711.GS63119@droso.dk>
In-Reply-To: <201507151349.t6FDn5Sf079974@svnmir.geo.freebsd.org>
References:  <201507151349.t6FDn5Sf079974@svnmir.geo.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--veXX9dWIonWZEC6h
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Jul 15, 2015 at 01:49:05PM +0000, Alex Dupre wrote:
> Author: ale
> Date: Wed Jul 15 13:49:04 2015
> New Revision: 392140
> URL: https://svnweb.freebsd.org/changeset/ports/392140
>=20
> Log:
>   Update to 5.6.25 release.

Does this by any change fix this vulnerability?
http://www.vuxml.org/freebsd/36bd352d-299b-11e5-86ff-14dae9d210b8.html

If so, could you update the VuXML entry and MFH the update?

Thanks,
Erwin


--veXX9dWIonWZEC6h
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEVAwUBVai6B1F75hSlwe7HAQpwtwf/cTwqa2fXUda8RaasB6lUEZzwgtnEzUN7
6LrX+zb3gZJzEFciBi47ovA4ByTt6rWQcQVDRO9ClxUD2nVPLnoB8TIFunhOeh4R
Cd6SgcL3C3AOlO76tXAbKn8wsVtP+HKB+Nuc3pCwnb/4J2e/sGgUHBgyq8HFg3wa
c/wR+oz//4mOemjwOI41+6TaWvvHhASaJZ5fN6XlPiG1NItBDykpr7v6tU6kDPsN
bmQEz1e9VsC6+Kp/ekt2WaDRvKLo9ENoqwPOT2BdA2sDwiw0HdxkIek52t6Itlxc
5XbOnLs+X2oLOV20ZV5Ixv4QcktCuYuGOXbiTP3RMKJiQF0jgbigWQ==
=VMuy
-----END PGP SIGNATURE-----

--veXX9dWIonWZEC6h--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150717081711.GS63119>