From owner-freebsd-ports@FreeBSD.ORG Tue May 6 19:26:24 2014 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A6538BC5 for ; Tue, 6 May 2014 19:26:24 +0000 (UTC) Received: from ratatosk.b1t.name (ratatosk.b1t.name [46.150.100.6]) by mx1.freebsd.org (Postfix) with ESMTP id 5C7949E4 for ; Tue, 6 May 2014 19:26:23 +0000 (UTC) Received: from limbo.b1t.lan (limbo.b1t.lan [172.29.1.15]) by ratatosk.b1t.name (Postfix) with ESMTPSA id 790E7FC for ; Tue, 6 May 2014 22:26:15 +0300 (EEST) Message-ID: <53693756.7050306@b1t.name> Date: Tue, 06 May 2014 22:26:14 +0300 From: Volodymyr Kostyrko User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:24.0) Gecko/20100101 Thunderbird/24.5.0 MIME-Version: 1.0 To: freebsd-ports@freebsd.org Subject: www/openx: CVE-2013-7149 no patch available? Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 May 2014 19:26:24 -0000 Hi all. In case anyone is still using www/openx. Does anyone know about any patches for this issue? Had anyone patched openx by himself? -- Sphinx of black quartz judge my vow.