From owner-freebsd-ports@freebsd.org Fri Jun 17 04:30:28 2016 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1F3ECA7847C for ; Fri, 17 Jun 2016 04:30:28 +0000 (UTC) (envelope-from dirk.meyer@dinoex.sub.org) Received: from uucp.dinoex.sub.de (uucp.dinoex.sub.de [IPv6:2001:1440:5001:1::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "uucp.dinoex.sub.de", Issuer "StartCom Class 1 Primary Intermediate Server CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id A02B91862 for ; Fri, 17 Jun 2016 04:30:27 +0000 (UTC) (envelope-from dirk.meyer@dinoex.sub.org) Received: from uucp.dinoex.sub.de (uucp.dinoex.sub.de [194.45.71.2]) by uucp.dinoex.sub.de (8.15.2/8.14.9) with ESMTPS id u5H4U0Ci023379 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for ; Fri, 17 Jun 2016 06:30:00 +0200 (CEST) (envelope-from dirk.meyer@dinoex.sub.org) X-MDaemon-Deliver-To: Received: from bamd10.dinoex.sub.de (dinoex@localhost) by uucp.dinoex.sub.de (8.15.2/8.14.9/Submit) with BSMTP id u5H4U0SK023351 for ; Fri, 17 Jun 2016 06:30:00 +0200 (CEST) (envelope-from dirk.meyer@dinoex.sub.org) To: freebsd-ports@freebsd.org (FreeBSD Ports) Message-ID: From: dirk.meyer@dinoex.sub.org (Dirk Meyer) Organization: privat Subject: Re: openssl-1.0.2.13 Date: Fri, 17 Jun 2016 06:28:06 +0200 X-Mailer: Dinoex 1.79 References: X-Gateway: ZCONNECT bamd10.dinoex.sub.de [UNIX/Connect 0.94] X-PGP-Fingerprint: 44 16 EC 0A D3 3A 4F 28 8A 8A 47 93 F1 CF 2F 12 X-Copyright: (C) Copyright 2001 by Dirk Meyer -- All rights reserved. X-PGP-Key-Avail: mailto:pgp-public-keys@keys.de.pgp.net Subject:GET 0x331CDA5D X-ZC-VIA: 20160617000000S+2@dinoex.sub.org X-Milter: Spamilter (Reciever: uucp.dinoex.sub.de; Sender-ip: 194.45.71.2; Sender-helo: uucp.dinoex.sub.de; ) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (uucp.dinoex.sub.de [194.45.71.2]); Fri, 17 Jun 2016 06:30:01 +0200 (CEST) X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Jun 2016 04:30:28 -0000 Hallo Gerard Seibert, > I have a question regarding "openssl-1.0.2.13". Since the port is > marked as "vulnerable", I was wondering if there is any idea when a > corrected port will be released? openssl-1.0.2.13 is the fixed port. > Also, according to the documentation on > https://vuxml.FreeBSD.org/freebsd/6f0529e2-2e82-11e6-b2ec-b499baebfeaf.html > this only affects versions of openssl < 1.0.2_13 > > Affected packages > openssl < 1.0.2_13 > 0 <= openssl-devel > libressl < 2.3.6 > libressl-devel < 2.4.1 > > I am not an expert on this, so perhaps I am misinterpreting this data. You are correct, but your system uses an older (cached) version of the vuxml file. Please update your cache with: pkg audit -F kind regards Dirk - Dirk Meyer, Im Grund 4, 34317 Habichtswald, Germany - [dirk.meyer@dinoex.sub.org],[dirk.meyer@guug.de],[dinoex@FreeBSD.org]