Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 22 May 2015 20:51:12 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 199508] net/chrony: update to 1.31 to fix multiple security vulnerabilities
Message-ID:  <bug-199508-13-rrx72qQ6PT@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-199508-13@https.bugs.freebsd.org/bugzilla/>
References:  <bug-199508-13@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199508

--- Comment #5 from jason.unovitch@gmail.com ---
Created attachment 157058
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=157058&action=edit
Poudriere Build Logs from 10.1-RELEASE amd64

Can a committer evaluate applying this on the basis of maintainer timeout? 3
CVEs still affect the port. PR has been open a month with no comment from
maintainer. Major/minor release is the same and upstream only resolved the 3
CVEs in this release and bumped the patch level version.

Build time tested on 11-CURRENT amd64/i386, 10.1-RELEASE amd64/i386,
9.3-RELEASE amd64/i386, and 8.4-RELEASE amd64

Run time tested on 10.1-RELEASE

Jason

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-199508-13-rrx72qQ6PT>