Date: Tue, 29 Mar 2016 19:54:55 +0000 From: bugzilla-noreply@freebsd.org To: emulation@FreeBSD.org Subject: maintainer-feedback requested: [Bug 208385] security/linux-c6-nss needs updating to resolve vulnerabilities Message-ID: <bug-208385-4077-igIQotaAJq@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-208385-4077@https.bugs.freebsd.org/bugzilla/> References: <bug-208385-4077@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
Mikhail Teterin <mi@FreeBSD.org> has reassigned Bugzilla Automation <bugzilla@FreeBSD.org>'s request for maintainer-feedback to emulation@FreeBSD.org: Bug 208385: security/linux-c6-nss needs updating to resolve vulnerabilities https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D208385 --- Description --- The port is currently failing due to two vulnerabilities: https://vuxml.FreeBSD.org/freebsd/c4292768-5273-4f17-a267-c5fe35125ce4.html https://vuxml.FreeBSD.org/freebsd/75091516-6f4b-4059-9884-6727023dc366.html Both were filed on March 8th, and both were addressed by RedHat/CentOS the = next day with:=20 http://rhn.redhat.com/errata/RHSA-2016-0370.html The change for the port is simple enough -- just replace -2 with -5 in the nss-util RPM-version and update distinfo-files. But vuln.xml is harder...
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-208385-4077-igIQotaAJq>