Date: Fri, 22 May 2015 20:51:12 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 199508] net/chrony: update to 1.31 to fix multiple security vulnerabilities Message-ID: <bug-199508-13-rrx72qQ6PT@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-199508-13@https.bugs.freebsd.org/bugzilla/> References: <bug-199508-13@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199508 --- Comment #5 from jason.unovitch@gmail.com --- Created attachment 157058 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=157058&action=edit Poudriere Build Logs from 10.1-RELEASE amd64 Can a committer evaluate applying this on the basis of maintainer timeout? 3 CVEs still affect the port. PR has been open a month with no comment from maintainer. Major/minor release is the same and upstream only resolved the 3 CVEs in this release and bumped the patch level version. Build time tested on 11-CURRENT amd64/i386, 10.1-RELEASE amd64/i386, 9.3-RELEASE amd64/i386, and 8.4-RELEASE amd64 Run time tested on 10.1-RELEASE Jason -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-199508-13-rrx72qQ6PT>