From owner-freebsd-ports-bugs@FreeBSD.ORG  Fri Oct  1 09:09:45 2004
Return-Path: <owner-freebsd-ports-bugs@FreeBSD.ORG>
Delivered-To: freebsd-ports-bugs@freebsd.org
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP
	id 2076416A4CE; Fri,  1 Oct 2004 09:09:45 +0000 (GMT)
Received: from souryu.st.ryukoku.ac.jp (souryu.st.ryukoku.ac.jp [133.83.4.51])
	by mx1.FreeBSD.org (Postfix) with ESMTP
	id 10DD143D4C; Fri,  1 Oct 2004 09:09:44 +0000 (GMT)
	(envelope-from kjm@ideon.st.ryukoku.ac.jp)
Received: from localhost (localhost.st.ryukoku.ac.jp [127.0.0.1])
	by souryu.st.ryukoku.ac.jp (Postfix) with ESMTP
	id E8E2E134E5; Fri,  1 Oct 2004 18:09:41 +0900 (JST)
Received: from ideon.st.ryukoku.ac.jp (ideon.st.ryukoku.ac.jp [133.83.36.5])
	by souryu.st.ryukoku.ac.jp (Postfix) with ESMTP
	id 0918B134E3; Fri,  1 Oct 2004 18:09:37 +0900 (JST)
Received: from ideon.st.ryukoku.ac.jp (ActionKamen@localhost [127.0.0.1])
	i9199a5Q070220;	Fri, 1 Oct 2004 18:09:36 +0900 (JST)
	(envelope-from kjm@ideon.st.ryukoku.ac.jp)
From: kjm@rins.ryukoku.ac.jp (KOJIMA Hajime)
To: Tom Rhodes <trhodes@FreeBSD.org>
In-reply-to: Your message of "Wed, 29 Sep 2004 16:55:34 GMT"
In-reply-to: <200409291655.i8TGtYmq079950@freefall.freebsd.org>
References: <200409291655.i8TGtYmq079950@freefall.freebsd.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <70218.1096621776.1@ideon.st.ryukoku.ac.jp>
Content-Transfer-Encoding: 7bit
Date: Fri, 01 Oct 2004 18:09:36 +0900
Message-ID: <70219.1096621776@ideon.st.ryukoku.ac.jp>
Sender: kjm@ideon.st.ryukoku.ac.jp
X-Virus-Scanned: by AMaViS perl-11
cc: freebsd-ports-bugs@FreeBSD.org
cc: kjm@rins.ryukoku.ac.jp
Subject: Re: ports/72161: vuln.xml bug - CAN-2004-0492 vulnerability was
	fixed already in apache-1.3.31_1.
X-BeenThere: freebsd-ports-bugs@freebsd.org
X-Mailman-Version: 2.1.1
Precedence: list
List-Id: Ports bug reports <freebsd-ports-bugs.freebsd.org>
List-Unsubscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-ports-bugs>,
	<mailto:freebsd-ports-bugs-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-ports-bugs>
List-Post: <mailto:freebsd-ports-bugs@freebsd.org>
List-Help: <mailto:freebsd-ports-bugs-request@freebsd.org?subject=help>
List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-ports-bugs>,
	<mailto:freebsd-ports-bugs-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Oct 2004 09:09:45 -0000

In <200409291655.i8TGtYmq079950@freefall.freebsd.org>,
Tom Rhodes wrote:
| Synopsis: vuln.xml bug - CAN-2004-0492 vulnerability was fixed already in apache-1.3.31_1.
| 
| State-Changed-From-To: open->closed
| State-Changed-By: trhodes
| State-Changed-When: Wed Sep 29 16:52:09 GMT 2004
| State-Changed-Why: 
| Over to me, vuln updated, PR resolved, thanks.
| 
| 
| Responsible-Changed-From-To: freebsd-ports-bugs->trhodes
| Responsible-Changed-By: trhodes
| Responsible-Changed-When: Wed Sep 29 16:52:09 GMT 2004
| Responsible-Changed-Why: 
| Over to me, vuln updated, PR resolved, thanks.
| 
| http://www.freebsd.org/cgi/query-pr.cgi?pr=72161

  bad:  apache <=1.3.31_1
  good: apache < 1.3.31_1

- kjm