From owner-cvs-all@FreeBSD.ORG Thu Jul 22 07:28:17 2010 Return-Path: Delivered-To: cvs-all@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4050E106566C; Thu, 22 Jul 2010 07:28:17 +0000 (UTC) (envelope-from beat@FreeBSD.org) Received: from marvin.chruetertee.ch (marvin.chruetertee.ch [217.150.245.55]) by mx1.freebsd.org (Postfix) with ESMTP id C98858FC16; Thu, 22 Jul 2010 07:28:16 +0000 (UTC) Received: from daedalus.network.local ([195.141.49.100]) (authenticated bits=0) by marvin.chruetertee.ch (8.14.3/8.14.3) with ESMTP id o6M7SF5u014941 (version=TLSv1/SSLv3 cipher=DHE-DSS-CAMELLIA256-SHA bits=256 verify=NO); Thu, 22 Jul 2010 07:28:15 GMT (envelope-from beat@FreeBSD.org) Message-ID: <4C47F37A.8000701@FreeBSD.org> Date: Thu, 22 Jul 2010 09:30:02 +0200 From: Beat Gaetzi User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.9.1.11) Gecko/20100721 Lightning/1.0b1 Thunderbird/3.0.6 MIME-Version: 1.0 To: "Simon L. Nielsen" References: <201007211246.o6LCkHIm034603@repoman.freebsd.org> <20100721180819.GA1545@arthur.nitro.dk> In-Reply-To: <20100721180819.GA1545@arthur.nitro.dk> X-Enigmail-Version: 1.0.1 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Jul 2010 07:28:17 -0000 On 21.07.2010 20:08, Simon L. Nielsen wrote: > On 2010.07.21 12:46:17 +0000, Beat Gaetzi wrote: >> beat 2010-07-21 12:46:17 UTC >> >> FreeBSD ports repository >> >> Modified files: >> security/vuxml vuln.xml >> Log: >> - Document mozilla -- multiple vulnerabilities > > Are we sure that none of these bugs don't affect the old release? > That seems a bit unlikely to me... Yes, very unlikely. As upstream support for the Mozilla Application Suite was dropped in 2006 the information which vulnerability also affects the Mozilla Suit is not published. I'm looking forward that we could remove www/mozilla from the ports tree soon. We are already working on that. Beat