Some vulnerabilities were fixed in CUPS 1.3.10: [1] Fix: The following VuXML entry should be evaluated and added: How-To-Repeat: [1] http://www.gentoo.org/security/en/glsa/glsa-200904-20.xml
Responsible Changed From-To: freebsd-ports-bugs->dinoex Over to maintainer (via the GNATS Auto Assign Tool)
dinoex 2009-05-07 07:57:05 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: - add CUPS 1.3.10 PR: 134247 Revision Changes Path 1.1925 +53 -1 ports/security/vuxml/vuln.xml _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
State Changed From-To: open->closed committed, thanks.
Eygene Ryabinkin schrieb:, > About the patch for bsd.openssl.mk: to minimize code duplication, > the added 'else' clause can be changed to > ----- > .undef OPENSSL_PORT > .undef OPENSSL_SHLIBVER > ----- > This will minimize the effort to change the defaults in future. But it will fail to create a correct dependency in other cases. kind regards Dirk - Dirk Meyer, Im Grund 4, 34317 Habichtswald, Germany - [dirk.meyer@dinoex.sub.org],[dirk.meyer@guug.de],[dinoex@FreeBSD.org] http://people.freebsd.org/~dinoex/errorlogs/