Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 03 Jan 2016 08:01:30 +0000
From:      bugzilla-noreply@freebsd.org
To:        emulation@FreeBSD.org
Subject:   [Bug 205578] x11/linux-c6-xorg-libs: patch for vulnerability now available from upstream
Message-ID:  <bug-205578-4077-rHL3NIESy6@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-205578-4077@https.bugs.freebsd.org/bugzilla/>
References:  <bug-205578-4077@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D205578

John Hein <z7dr6ut7gs@snkmail.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |z7dr6ut7gs@snkmail.com

--- Comment #1 from John Hein <z7dr6ut7gs@snkmail.com> ---
Created attachment 164982
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D164982&action=
=3Dedit
[patch] update centos 6.6->6.7 (partial)

The attached patch updates Mk/bsd.linux-rpm.mk and x11/linux-c6-xorg-libs to
use the centos 6.7 rpms (and bump PORTREVISION).  But if this is the way to=
 go,
it's just a start...

To do:

 (1) Identify / update other ports affected by updating LINUX_DIST_VER to 6=
.7
(distinfo updates).

 (2) exp run to verify all's well after (1) - run with
DISABLE_VULNERABILITIES=3D1 until (3) is done.

 (3) After updating to centos 6.7 rpms, update vuxml database entry as
mentioned in the original description for this bug such that xorg-libs-7.4_=
4 is
not marked vulnerable.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-205578-4077-rHL3NIESy6>