Date: Thu, 28 May 2015 12:31:42 -0500 From: Mark Felder <feld@FreeBSD.org> To: Bryan Drewery <bdrewery@FreeBSD.org>, Roger Marquis <marquis@roble.com> Cc: freebsd-ports@freebsd.org Subject: Re: New pkg audit / vuln.xml failures (php55, unzoo) Message-ID: <1432834302.3255751.280669169.3E59C44B@webmail.messagingengine.com> In-Reply-To: <556746A4.4090208@FreeBSD.org> References: <alpine.BSF.2.11.1505171402430.52815@eboyr.pbz> <20150523153029.B7BD3280@hub.freebsd.org> <1432659389.3130746.278522905.6D1E6549@webmail.messagingengine.com> <20150527174037.EF719B11@hub.freebsd.org> <556746A4.4090208@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, May 28, 2015, at 11:47, Bryan Drewery wrote: > > Personally I agree on all points. Our ports security regime is not > working. I already communicated further with Roger off-list, but would like to point out that I *do* think there is a problem, but I don't think it's "the sky is falling / don't use FreeBSD" yet. This is a solvable problem that simply requires some defined processes and participation/organization. It seems like we're talking to ourselves here, so do we need to hijack the ports-secteam@ alias and start figuring things out ourselves?
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1432834302.3255751.280669169.3E59C44B>