Date: Mon, 29 Aug 2005 22:50:07 +0200 From: "Simon L. Nielsen" <simon@FreeBSD.org> To: Ade Lovett <ade@FreeBSD.org> Cc: gnome@FreeBSD.org Subject: Re: Security vulnerability in evolution Message-ID: <20050829205006.GA858@zaphod.nitro.dk> In-Reply-To: <C3A2EBF8-E0A9-4B2F-B7EA-6D08D7AC066C@FreeBSD.org> References: <20050827223220.GQ857@zaphod.nitro.dk> <C3A2EBF8-E0A9-4B2F-B7EA-6D08D7AC066C@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--LZvS9be/3tNcYl/X Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2005.08.27 19:41:51 -0700, Ade Lovett wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 >=20 >=20 > On Aug 27, 2005, at 15:32 , Simon L. Nielsen wrote: >=20 > >Hello evolution maintainers, > > > >As recently documented in the FreeBSD VuXML document [1] there is a > >security vulnerability in evolution. This has been fixed in the > >upstream version, 2.3.7, or it is possible to obtain backported > >patches from other vendors, e.g. see [2]. > > > >Please update the port as soon as possible. >=20 > PORTNAME=3D evolution > PORTVERSION=3D 2.3.8 >=20 > is part of the impending gnome 2.12 release which will drop in some =20 > time shortly after 6.0-REL comes out (the wonders of 'conflicting' =20 > release schedules) I see that marcus added a patch to the port (thanks!), so it is OK now. I just updated VuXML to note that the current port version is fixed. --=20 Simon L. Nielsen --LZvS9be/3tNcYl/X Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (FreeBSD) iD8DBQFDE3T+h9pcDSc1mlERAjE1AJwKPFjEyGdrap4y/yzjjUlFVkqvMwCgw1/q rO7bY0NVXfoT0ksK9Gm+0gk= =SJ9V -----END PGP SIGNATURE----- --LZvS9be/3tNcYl/X--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050829205006.GA858>