Date: Sat, 30 Jan 2016 14:55:32 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 206759] [patch update] ftp/curl 7.46.0 -> 7.47.0 (fixes CVE-2016-0755) Message-ID: <bug-206759-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D206759 Bug ID: 206759 Summary: [patch update] ftp/curl 7.46.0 -> 7.47.0 (fixes CVE-2016-0755) Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: sunpoet@FreeBSD.org Reporter: pi@FreeBSD.org Assignee: sunpoet@FreeBSD.org Flags: maintainer-feedback?(sunpoet@FreeBSD.org) Created attachment 166302 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D166302&action= =3Dedit patch Testbuilds 11a, 10.2a+i, 9.3a are OK. vuln.xml file has a bug, too. --- vuln.xml.orig 2016-01-30 15:53:03.521228000 +0100 +++ vuln.xml 2016-01-30 15:53:07.036119000 +0100 @@ -608,8 +608,7 @@ <affects> <package> <name>curl</name> - <range><ge>7.10.0</ge></range> - <range><lt>7.47.0</lt></range> + <range><ge>7.10.0</ge><lt>7.47.0</lt></range> </package> </affects> <description> --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-206759-13>