Date: Sun, 03 Jan 2016 08:01:30 +0000 From: bugzilla-noreply@freebsd.org To: emulation@FreeBSD.org Subject: [Bug 205578] x11/linux-c6-xorg-libs: patch for vulnerability now available from upstream Message-ID: <bug-205578-4077-rHL3NIESy6@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-205578-4077@https.bugs.freebsd.org/bugzilla/> References: <bug-205578-4077@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D205578 John Hein <z7dr6ut7gs@snkmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |z7dr6ut7gs@snkmail.com --- Comment #1 from John Hein <z7dr6ut7gs@snkmail.com> --- Created attachment 164982 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D164982&action= =3Dedit [patch] update centos 6.6->6.7 (partial) The attached patch updates Mk/bsd.linux-rpm.mk and x11/linux-c6-xorg-libs to use the centos 6.7 rpms (and bump PORTREVISION). But if this is the way to= go, it's just a start... To do: (1) Identify / update other ports affected by updating LINUX_DIST_VER to 6= .7 (distinfo updates). (2) exp run to verify all's well after (1) - run with DISABLE_VULNERABILITIES=3D1 until (3) is done. (3) After updating to centos 6.7 rpms, update vuxml database entry as mentioned in the original description for this bug such that xorg-libs-7.4_= 4 is not marked vulnerable. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-205578-4077-rHL3NIESy6>