From owner-svn-ports-head@freebsd.org Fri Jul 17 08:17:16 2015 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9C8EF9A4D8B; Fri, 17 Jul 2015 08:17:16 +0000 (UTC) (envelope-from erwin@mail.droso.net) Received: from mail.droso.net (koala.droso.dk [213.239.220.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AEC4F1F2D; Fri, 17 Jul 2015 08:17:15 +0000 (UTC) (envelope-from erwin@mail.droso.net) Received: by mail.droso.net (Postfix, from userid 1001) id 6CAA5142A3; Fri, 17 Jul 2015 10:17:11 +0200 (CEST) Date: Fri, 17 Jul 2015 10:17:11 +0200 From: Erwin Lansing To: Alex Dupre Cc: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: Re: svn commit: r392140 - head/databases/mysql56-server Message-ID: <20150717081711.GS63119@droso.dk> References: <201507151349.t6FDn5Sf079974@svnmir.geo.freebsd.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="veXX9dWIonWZEC6h" Content-Disposition: inline In-Reply-To: <201507151349.t6FDn5Sf079974@svnmir.geo.freebsd.org> X-Operating-System: FreeBSD/amd64 9.3-RELEASE-p5 User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Jul 2015 08:17:16 -0000 --veXX9dWIonWZEC6h Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Jul 15, 2015 at 01:49:05PM +0000, Alex Dupre wrote: > Author: ale > Date: Wed Jul 15 13:49:04 2015 > New Revision: 392140 > URL: https://svnweb.freebsd.org/changeset/ports/392140 >=20 > Log: > Update to 5.6.25 release. Does this by any change fix this vulnerability? http://www.vuxml.org/freebsd/36bd352d-299b-11e5-86ff-14dae9d210b8.html If so, could you update the VuXML entry and MFH the update? Thanks, Erwin --veXX9dWIonWZEC6h Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEVAwUBVai6B1F75hSlwe7HAQpwtwf/cTwqa2fXUda8RaasB6lUEZzwgtnEzUN7 6LrX+zb3gZJzEFciBi47ovA4ByTt6rWQcQVDRO9ClxUD2nVPLnoB8TIFunhOeh4R Cd6SgcL3C3AOlO76tXAbKn8wsVtP+HKB+Nuc3pCwnb/4J2e/sGgUHBgyq8HFg3wa c/wR+oz//4mOemjwOI41+6TaWvvHhASaJZ5fN6XlPiG1NItBDykpr7v6tU6kDPsN bmQEz1e9VsC6+Kp/ekt2WaDRvKLo9ENoqwPOT2BdA2sDwiw0HdxkIek52t6Itlxc 5XbOnLs+X2oLOV20ZV5Ixv4QcktCuYuGOXbiTP3RMKJiQF0jgbigWQ== =VMuy -----END PGP SIGNATURE----- --veXX9dWIonWZEC6h--