Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Nov 2015 21:42:35 -0600
From:      Mark Felder <feld@feld.me>
To:        Phil Baker <baker1tex@gmail.com>
Cc:        ports-secteam@FreeBSD.org, gecko@FreeBSD.org
Subject:   Re: Mozilla security pkg updates for 10.2 RELEASE
Message-ID:  <69D96862-E843-483E-BB04-B6CF1B111AEE@feld.me>
In-Reply-To: <CALtZJzOrsLzqocp298L_dhXtecZZfKtawMiYw8ZQbmmtSyJbdw@mail.gmail.com>
References:  <CALtZJzOrsLzqocp298L_dhXtecZZfKtawMiYw8ZQbmmtSyJbdw@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help

> On Nov 27, 2015, at 13:57, Phil Baker <baker1tex@gmail.com> wrote:
>=20
> To whom it may concern,
>=20
> I received a pkg update for the nspr vulnerability on my FreeBSD 9.3 =
system
> on or about 22 November.  As of 27 November, I have not yet seen the =
binary
> patch for my FreeBSD 10.2 systems. I noticed that my 10.2 systems have =
the
> patch available in the ports tree for several days.
>=20
> http://www.vuxml.org/freebsd/9d04936c-75f1-4a2c-9ade-4c1708be5df9.html
>=20
> Kind regards,
> Phil Baker
>=20

I'm not sure why this hasn't been MFH; it was approved by me. I have =
asked in the bugzilla entry.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69D96862-E843-483E-BB04-B6CF1B111AEE>