Date: Thu, 18 Mar 2010 17:41:22 -0000 From: "Chris" <chris@chrysalisnet.org> To: "'Philip M. Gollucci'" <pgollucci@p6m7g8.com> Cc: apache@freebsd.org Subject: RE: FreeBSD Port: www/apache22 Message-ID: <029401cac6c2$39f05fd0$add11f70$@org> In-Reply-To: <4BA264C6.80903@p6m7g8.com> References: <020701cac555$9f1c3b40$dd54b1c0$@org> <4BA01237.30500@p6m7g8.com> <4BA01288.8090206@p6m7g8.com> <020c01cac55f$ef4a0110$cdde0330$@org> <4BA01526.30809@p6m7g8.com> <020e01cac562$6d84b140$488e13c0$@org> <4BA01A20.4070804@p6m7g8.com> <028701cac6a9$c22cd090$468671b0$@org> <4BA264C6.80903@p6m7g8.com>
next in thread | previous in thread | raw e-mail | index | archive | help
enjoy your vacation :) yes I will double check if I am using those modules and I think I am not. -----Original Message----- From: Philip M. Gollucci [mailto:pgollucci@p6m7g8.com] Sent: 18 March 2010 17:37 To: Chris Cc: apache@freebsd.org Subject: Re: FreeBSD Port: www/apache22 On 3/18/2010 10:46 AM, Chris wrote: > hi again. > > is it not possible to bump apache without updating apr? using the same apr Yes, but it is untested. > as in 2.2.14? I see 4 security notices against 2.2.14 which makes me > worried. I thought freebsd ports allowed commits for security reasons > during a freeze/slush. Yes, they do. I'd wagger you're not using any of the modules that are vulnerable. If you are really in a rush, you are welcome to submit patches. As for me, back to vacation! __________ Information from ESET NOD32 Antivirus, version of virus signature database 4955 (20100318) __________ The message was checked by ESET NOD32 Antivirus. http://www.eset.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?029401cac6c2$39f05fd0$add11f70$>