Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 11 Jun 2022 10:19:05 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 264426] www/mitmproxy: Update to 8.0.0 (<=7.0.4 vulnerable to CVE-2022-24766)
Message-ID:  <bug-264426-7788-XYGnYGwVEn@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-264426-7788@https.bugs.freebsd.org/bugzilla/>
References:  <bug-264426-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D264426

--- Comment #2 from p5B2EA84B3@t-online.de ---
from
https://docs.freebsd.org/en/books/porters-handbook/security/#security-notify

12.3. Keeping the Community Informed
12.3.1. The VuXML Database

A very important and urgent step to take as early after a security
vulnerability is discovered as possible is to notify the community of port
users about the jeopardy. Such notification serves two purposes. ...

What is the reason that mitmproxy still has no entry in the FreeBSD VuXML
database?

The trust in the FreeBSD VuXML database suffers if entries are delayed.

--=20
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-264426-7788-XYGnYGwVEn>