Update to latest. Address vulnerability found here http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192 Builds cleanly in Tinderbox here http://jgh.devio.us/files/logs/apache-2.2.20.log
Responsible Changed From-To: freebsd-ports-bugs->apache Over to maintainer (via the GNATS Auto Assign Tool)
State Changed From-To: open->closed Committed.
ade 2011-09-02 06:18:02 UTC FreeBSD ports repository Modified files: www/apache22 Makefile distinfo Log: Emergency upgrade to 2.2.20 - CVE-2011-3192. Any complaints, talk to me. PR: 160381 Revision Changes Path 1.291 +1 -2 ports/www/apache22/Makefile 1.85 +2 -2 ports/www/apache22/distinfo _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
If we're upgrading the port, can we consider fixing WITH_BDB_BASE ? --=20 Jo Rhett Net Consonance : consonant endings by net philanthropy, open source and = other randomness
Hi Jo, Certainly it could be considered, but please open new PR, email ports@ or apache@. Thanks! Chris -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.