From owner-freebsd-ports-bugs@FreeBSD.ORG Fri Oct 1 09:09:45 2004 Return-Path: <owner-freebsd-ports-bugs@FreeBSD.ORG> Delivered-To: freebsd-ports-bugs@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2076416A4CE; Fri, 1 Oct 2004 09:09:45 +0000 (GMT) Received: from souryu.st.ryukoku.ac.jp (souryu.st.ryukoku.ac.jp [133.83.4.51]) by mx1.FreeBSD.org (Postfix) with ESMTP id 10DD143D4C; Fri, 1 Oct 2004 09:09:44 +0000 (GMT) (envelope-from kjm@ideon.st.ryukoku.ac.jp) Received: from localhost (localhost.st.ryukoku.ac.jp [127.0.0.1]) by souryu.st.ryukoku.ac.jp (Postfix) with ESMTP id E8E2E134E5; Fri, 1 Oct 2004 18:09:41 +0900 (JST) Received: from ideon.st.ryukoku.ac.jp (ideon.st.ryukoku.ac.jp [133.83.36.5]) by souryu.st.ryukoku.ac.jp (Postfix) with ESMTP id 0918B134E3; Fri, 1 Oct 2004 18:09:37 +0900 (JST) Received: from ideon.st.ryukoku.ac.jp (ActionKamen@localhost [127.0.0.1]) i9199a5Q070220; Fri, 1 Oct 2004 18:09:36 +0900 (JST) (envelope-from kjm@ideon.st.ryukoku.ac.jp) From: kjm@rins.ryukoku.ac.jp (KOJIMA Hajime) To: Tom Rhodes <trhodes@FreeBSD.org> In-reply-to: Your message of "Wed, 29 Sep 2004 16:55:34 GMT" In-reply-to: <200409291655.i8TGtYmq079950@freefall.freebsd.org> References: <200409291655.i8TGtYmq079950@freefall.freebsd.org> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <70218.1096621776.1@ideon.st.ryukoku.ac.jp> Content-Transfer-Encoding: 7bit Date: Fri, 01 Oct 2004 18:09:36 +0900 Message-ID: <70219.1096621776@ideon.st.ryukoku.ac.jp> Sender: kjm@ideon.st.ryukoku.ac.jp X-Virus-Scanned: by AMaViS perl-11 cc: freebsd-ports-bugs@FreeBSD.org cc: kjm@rins.ryukoku.ac.jp Subject: Re: ports/72161: vuln.xml bug - CAN-2004-0492 vulnerability was fixed already in apache-1.3.31_1. X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Ports bug reports <freebsd-ports-bugs.freebsd.org> List-Unsubscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-ports-bugs>, <mailto:freebsd-ports-bugs-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-ports-bugs> List-Post: <mailto:freebsd-ports-bugs@freebsd.org> List-Help: <mailto:freebsd-ports-bugs-request@freebsd.org?subject=help> List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-ports-bugs>, <mailto:freebsd-ports-bugs-request@freebsd.org?subject=subscribe> X-List-Received-Date: Fri, 01 Oct 2004 09:09:45 -0000 In <200409291655.i8TGtYmq079950@freefall.freebsd.org>, Tom Rhodes wrote: | Synopsis: vuln.xml bug - CAN-2004-0492 vulnerability was fixed already in apache-1.3.31_1. | | State-Changed-From-To: open->closed | State-Changed-By: trhodes | State-Changed-When: Wed Sep 29 16:52:09 GMT 2004 | State-Changed-Why: | Over to me, vuln updated, PR resolved, thanks. | | | Responsible-Changed-From-To: freebsd-ports-bugs->trhodes | Responsible-Changed-By: trhodes | Responsible-Changed-When: Wed Sep 29 16:52:09 GMT 2004 | Responsible-Changed-Why: | Over to me, vuln updated, PR resolved, thanks. | | http://www.freebsd.org/cgi/query-pr.cgi?pr=72161 bad: apache <=1.3.31_1 good: apache < 1.3.31_1 - kjm