Date: Wed, 20 Feb 2013 14:01:05 +0000 From: Alexey Dokuchaev <danfe@FreeBSD.org> To: Ruslan Mahmatkhanov <rm@FreeBSD.org> Cc: svn-ports-head@freebsd.org, svn-ports-all@freebsd.org, ports-committers@freebsd.org Subject: Re: svn commit: r312626 - head/security/vuxml Message-ID: <20130220140104.GA75978@FreeBSD.org> In-Reply-To: <201302201358.r1KDwKxc094476@svn.freebsd.org> References: <201302201358.r1KDwKxc094476@svn.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Feb 20, 2013 at 01:58:20PM +0000, Ruslan Mahmatkhanov wrote: > New Revision: 312626 > URL: http://svnweb.freebsd.org/changeset/ports/312626 > > Log: > - add an entry for net/nss-pam-ldapd stack-based buffer overflow > > According to advisory, vulnerability exists in nss-pam-ldapd < 0.8.11, > but since we never had this version in the ports tree, mark everything > < 0.8.12 as vulnerable. This seems weird. Is there any limitation in VuXML that we need to cope with by introducing such inconsistencies with official advisories? ./danfe
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130220140104.GA75978>