Date: Fri, 30 Jun 2017 10:18:40 -0600 From: Adam Weinberger <adamw@adamw.org> To: Jos Chrispijn <bsdports@cloudzeeland.nl> Cc: FreeBSD Ports ML <freebsd-ports@freebsd.org>, cpm@FreeBSD.org Subject: Re: Vulnerability Message-ID: <FEA32EF9-DAD3-4FAB-975D-67D785041951@adamw.org> In-Reply-To: <6d826a0d-b54c-ef9d-88d3-bdf4f159c434@cloudzeeland.nl> References: <6d826a0d-b54c-ef9d-88d3-bdf4f159c434@cloudzeeland.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
> On 30 Jun, 2017, at 10:04, Jos Chrispijn <bsdports@cloudzeeland.nl> = wrote: >=20 > Dear port maintainer, >=20 > Just to let you know that I ran into the following vulenerability = report: >=20 > libgcrypt-1.7.7 is vulnerable: > libgcrypt -- side-channel attack on RSA secret keys > CVE: CVE-2017-7526 > = WWW:https://vuxml.FreeBSD.org/freebsd/ed3bf433-5d92-11e7-aa14-e8e0b747a45a= .html >=20 > Could you send out a port update? Thanks in advance! >=20 > Keep up the good work, > Jos Chrispijn Hi Jos, See https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220382 It's in the exp-run queue. # Adam --=20 Adam Weinberger adamw@adamw.org https://www.adamw.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?FEA32EF9-DAD3-4FAB-975D-67D785041951>