Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Feb 2013 14:01:05 +0000
From:      Alexey Dokuchaev <danfe@FreeBSD.org>
To:        Ruslan Mahmatkhanov <rm@FreeBSD.org>
Cc:        svn-ports-head@freebsd.org, svn-ports-all@freebsd.org, ports-committers@freebsd.org
Subject:   Re: svn commit: r312626 - head/security/vuxml
Message-ID:  <20130220140104.GA75978@FreeBSD.org>
In-Reply-To: <201302201358.r1KDwKxc094476@svn.freebsd.org>
References:  <201302201358.r1KDwKxc094476@svn.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Feb 20, 2013 at 01:58:20PM +0000, Ruslan Mahmatkhanov wrote:
> New Revision: 312626
> URL: http://svnweb.freebsd.org/changeset/ports/312626
> 
> Log:
>   - add an entry for net/nss-pam-ldapd stack-based buffer overflow
>   
>   According to advisory, vulnerability exists in nss-pam-ldapd < 0.8.11,
>   but since we never had this version in the ports tree, mark everything
>   < 0.8.12 as vulnerable.

This seems weird.  Is there any limitation in VuXML that we need to cope
with by introducing such inconsistencies with official advisories?

./danfe



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130220140104.GA75978>