Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 29 Aug 2005 22:50:07 +0200
From:      "Simon L. Nielsen" <simon@FreeBSD.org>
To:        Ade Lovett <ade@FreeBSD.org>
Cc:        gnome@FreeBSD.org
Subject:   Re: Security vulnerability in evolution
Message-ID:  <20050829205006.GA858@zaphod.nitro.dk>
In-Reply-To: <C3A2EBF8-E0A9-4B2F-B7EA-6D08D7AC066C@FreeBSD.org>
References:  <20050827223220.GQ857@zaphod.nitro.dk> <C3A2EBF8-E0A9-4B2F-B7EA-6D08D7AC066C@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--LZvS9be/3tNcYl/X
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On 2005.08.27 19:41:51 -0700, Ade Lovett wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>=20
>=20
> On Aug 27, 2005, at 15:32 , Simon L. Nielsen wrote:
>=20
> >Hello evolution maintainers,
> >
> >As recently documented in the FreeBSD VuXML document [1] there is a
> >security vulnerability in evolution.  This has been fixed in the
> >upstream version, 2.3.7, or it is possible to obtain backported
> >patches from other vendors, e.g. see [2].
> >
> >Please update the port as soon as possible.
>=20
> PORTNAME=3D       evolution
> PORTVERSION=3D    2.3.8
>=20
> is part of the impending gnome 2.12 release which will drop in some =20
> time shortly after 6.0-REL comes out (the wonders of 'conflicting' =20
> release schedules)

I see that marcus added a patch to the port (thanks!), so it is OK
now.  I just updated VuXML to note that the current port version is
fixed.

--=20
Simon L. Nielsen

--LZvS9be/3tNcYl/X
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQFDE3T+h9pcDSc1mlERAjE1AJwKPFjEyGdrap4y/yzjjUlFVkqvMwCgw1/q
rO7bY0NVXfoT0ksK9Gm+0gk=
=SJ9V
-----END PGP SIGNATURE-----

--LZvS9be/3tNcYl/X--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050829205006.GA858>