From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 9907 invoked by uid 1002); 23 Jul 2003 10:29:53 -0000 Mailing-List: contact gentoo-dev-help@gentoo.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-dev@gentoo.org Received: (qmail 26406 invoked from network); 23 Jul 2003 10:29:53 -0000 Date: Wed, 23 Jul 2003 06:32:49 -0400 From: Michael Cummings To: gentoo-dev@gentoo.org Message-ID: <20030723103249.GA1855@enki.datanode.net> Reply-To: mcummings@gentoo.org Mail-Followup-To: gentoo-dev@gentoo.org Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="4Ckj6UjgE2iN1+kY" Content-Disposition: inline User-Agent: Mutt/1.4.1i Subject: [gentoo-dev] CGI.pm testing needed on non-x86 arch's X-Archives-Salt: ba4d3127-ce00-4cf0-b636-1087095e7f01 X-Archives-Hash: d099245b33e0f488ea71b3866342a53f --4Ckj6UjgE2iN1+kY Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable There is a security fix in the newer dev-perl/CGI for cross site scripting vulnerability. Can I get confirmation on other arch's that it installs fine? I expect no problems in compilation/execution, but I'd like confirmation before unmasking it. Thanks! --=20 -----o()o--------------------------------------------- | http://www.gentoo.org/ | #gentoo-dev on irc.freenode.net Gentoo Dev | #gentoo-perl on irc.freenode.net Perl Guy | | GnuPG Key ID: AB5CED4E9E7F4E2E -----o()o--------------------------------------------- --4Ckj6UjgE2iN1+kY Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/HmRRq1ztTp5/Ti4RAuHEAJ9x4wCkLfbraqIp/6V77KdYc3gxXgCgvHhC LTdaJE6L14pmfvsmPpOy4BY= =qfAM -----END PGP SIGNATURE----- --4Ckj6UjgE2iN1+kY--