- Fix remote exploitation vulnerability described in: http://www.vuxml.org/freebsd/e86fbb5f-0d04-11da-bc08-0001020eed82.html - Patch taken from awstats CVS ( http://tinyurl.com/duy6o ) Added file(s): - files/patch-awstats.pl Port maintainer (webmaster@lightningfire.net) is cc'd. Generated with FreeBSD Port Tools 0.63
Dear maintainer of FreeBSD port www/awstats, please take a look at http://www.freebsd.org/cgi/query-pr.cgi?q=85071 Do you approve this update? -- Pav Lucistnik <pav@oook.cz> <pav@FreeBSD.org> With sufficient thrust, pigs fly just fine. -- RFC 1925
State Changed From-To: open->feedback Asked maintainer for approval
Responsible Changed From-To: freebsd-ports-bugs->pav Track
Responsible Changed From-To: pav->simon Simon offered to handle this with his secteam hat on
State Changed From-To: feedback->closed Committed, thanks for the submission!