From owner-cvs-all@FreeBSD.ORG Tue May 8 20:23:12 2012 Return-Path: Delivered-To: cvs-all@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 0A848106566B; Tue, 8 May 2012 20:23:12 +0000 (UTC) (envelope-from rm@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id D2D9D8FC1E; Tue, 8 May 2012 20:23:11 +0000 (UTC) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.4/8.14.4) with ESMTP id q48KNBPh012677; Tue, 8 May 2012 20:23:11 GMT (envelope-from rm@repoman.freebsd.org) Received: (from rm@localhost) by repoman.freebsd.org (8.14.4/8.14.4/Submit) id q48KNBsV012676; Tue, 8 May 2012 20:23:11 GMT (envelope-from rm) Message-Id: <201205082023.q48KNBsV012676@repoman.freebsd.org> From: Ruslan Mahmatkhanov Date: Tue, 8 May 2012 20:23:11 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/security/vuxml vuln.xml X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 May 2012 20:23:12 -0000 rm 2012-05-08 20:23:11 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: Mark php52 >= 5.2.15 as not vulnerable to NULL byte poisoning [1]. This problem was fixed in 5.3.4 and 5.2.15 simultaneously. [1] http://www.vuxml.org/freebsd/3761df02-0f9c-11e0-becc-0022156e8794.html Reported by: Svyatoslav Lempert Revision Changes Path 1.2689 +2 -2 ports/security/vuxml/vuln.xml