#39028 closed update (fixed)
Update nginx to 1.4.1
Reported by: | macports.org@… | Owned by: | neverpanic (Clemens Lang) |
---|---|---|---|
Priority: | High | Milestone: | |
Component: | ports | Version: | |
Keywords: | Cc: | ||
Port: | nginx |
Description
nginx 1.4.0 contains a buffer overflow vulnerability which 1.4.1 fixes: http://mailman.nginx.org/pipermail/nginx-announce/2013/000112.html
Attachments (1)
Change History (7)
comment:1 Changed 12 years ago by macports.org@…
comment:2 Changed 12 years ago by mf2k (Frank Schima)
Cc: | cal@… removed |
---|---|
Owner: | changed from macports-tickets@… to cal@… |
Type: | defect → update |
Version: | 2.1.3 |
comment:3 Changed 12 years ago by cooljeanius (Eric Gallager)
Considering this is a security issue, I'd say a MacPorts team member should probably set the priority to "High"
Changed 12 years ago by deric@…
Attachment: | nginx-1.4.1-update.patch added |
---|
comment:4 Changed 12 years ago by deric@…
Priority: | Normal → High |
---|
comment:5 Changed 12 years ago by deric@…
Resolution: | → fixed |
---|---|
Status: | new → closed |
I went ahead and committed my patch in r105831 since the port was openmaintainer, hope that's OK.
Note: See
TracTickets for help on using
tickets.
That should have been an "update" ticket, not "defect" sorry about that.