From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 26696 invoked by uid 1002); 23 Jul 2003 18:13:24 -0000 Mailing-List: contact gentoo-dev-help@gentoo.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-dev@gentoo.org Received: (qmail 3075 invoked from network); 23 Jul 2003 18:13:24 -0000 Date: Wed, 23 Jul 2003 20:11:08 +0200 From: Lars Weiler To: gentoo-dev@gentoo.org Message-ID: <20030723181108.GM26525@celeborn.wh-og.hs-niederrhein.de> Mail-Followup-To: gentoo-dev@gentoo.org References: <20030723103249.GA1855@enki.datanode.net> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="EgVrEAR5UttbsTXg" Content-Disposition: inline In-Reply-To: <20030723103249.GA1855@enki.datanode.net> X-Accept-Language: de,en,nl X-OS: Linux 2.4.21-ppc-r2 ppc X-PGP-KeyID: 475C474C X-PGP-CertKey: BEB4 C7C4 8160 BBF4 D0FB 373F 532A 82FB 475C 474C X-PGP-Request: http://www.chaosdorf.de/~pylon/pylon.key User-Agent: Mutt/1.5.4i Subject: Re: [gentoo-dev] CGI.pm testing needed on non-x86 arch's X-Archives-Salt: 542db741-a4c2-4035-b61e-5a09b5ba2a89 X-Archives-Hash: 56281c8a07afc8c7431bf92c6c92b7c0 --EgVrEAR5UttbsTXg Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline * Michael Cummings [03/07/23 06:32 -0400]: >There is a security fix in the newer dev-perl/CGI for cross site >scripting vulnerability. Can I get confirmation on other arch's that it >installs fine? Compiles and works on ppc. You can safely edit the keywords. Regards, Lars --EgVrEAR5UttbsTXg Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/Hs+8UyqC+0dcR0wRAvbhAJ4uTQ21vWGVlmjEDgx9SjIX1LZ4ygCePVyN LkK82zcyV66mfeDSqYFi0Go= =Pv2W -----END PGP SIGNATURE----- --EgVrEAR5UttbsTXg--