From owner-freebsd-ports@freebsd.org Thu Jan 25 13:59:39 2018 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1537DED9365 for ; Thu, 25 Jan 2018 13:59:39 +0000 (UTC) (envelope-from kremels@kreme.com) Received: from mail.covisp.net (www.covisp.net [65.121.55.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B658C7D9AA for ; Thu, 25 Jan 2018 13:59:38 +0000 (UTC) (envelope-from kremels@kreme.com) Content-Type: text/plain; charset=us-ascii Subject: Re: MariaDB 10.0 is vulnerable From: "@lbutlr" In-Reply-To: <38290E32-C6DC-4C1A-8495-150E78B74E9C@adamw.org> Date: Thu, 25 Jan 2018 06:52:33 -0700 Cc: freebsd ports Content-Transfer-Encoding: quoted-printable Message-Id: <59DA858A-6A9E-4E43-8884-19E7BC82FA92@kreme.com> References: <3F28783C-B8A6-42D4-9BB0-1FA089E40567@kreme.com> <38290E32-C6DC-4C1A-8495-150E78B74E9C@adamw.org> To: Adam Weinberger X-Mailer: Apple Mail (2.3445.6.9) X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Jan 2018 13:59:39 -0000 On 22 Jan 2018, at 16:12, Adam Weinberger wrote: > What happened here is that there are multiple known vulnerabilities in = MariaDB 10.0. Ports with known vulnerabilities are marked as vulnerable, = even if there's no update available. >=20 > You can ignore the vulnerability by rebuilding with 'make = DISABLE_VULNERABILITIES=3Dyes". Thanks, that makes sense, I was mostly confused because the update to = MariaDB was from he previous day. --=20 I do believe Marsellus Wallace, my husband, your boss, told you to take *me* out and do *whatever I wanted*. Now I wanna dance, I wanna win. I want that trophy, so dance good.