Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Nov 2015 21:42:35 -0600
From:      Mark Felder <feld@feld.me>
To:        Phil Baker <baker1tex@gmail.com>
Cc:        ports-secteam@FreeBSD.org, gecko@FreeBSD.org
Subject:   Re: Mozilla security pkg updates for 10.2 RELEASE
Message-ID:  <69D96862-E843-483E-BB04-B6CF1B111AEE@feld.me>
In-Reply-To: <CALtZJzOrsLzqocp298L_dhXtecZZfKtawMiYw8ZQbmmtSyJbdw@mail.gmail.com>
References:  <CALtZJzOrsLzqocp298L_dhXtecZZfKtawMiYw8ZQbmmtSyJbdw@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help


> On Nov 27, 2015, at 13:57, Phil Baker <baker1tex@gmail.com> wrote:
> 
> To whom it may concern,
> 
> I received a pkg update for the nspr vulnerability on my FreeBSD 9.3 system
> on or about 22 November.  As of 27 November, I have not yet seen the binary
> patch for my FreeBSD 10.2 systems. I noticed that my 10.2 systems have the
> patch available in the ports tree for several days.
> 
> http://www.vuxml.org/freebsd/9d04936c-75f1-4a2c-9ade-4c1708be5df9.html
> 
> Kind regards,
> Phil Baker
> 

I'm not sure why this hasn't been MFH; it was approved by me. I have asked in the bugzilla entry.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69D96862-E843-483E-BB04-B6CF1B111AEE>