Date: Sat, 11 Jun 2022 10:19:05 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 264426] www/mitmproxy: Update to 8.0.0 (<=7.0.4 vulnerable to CVE-2022-24766) Message-ID: <bug-264426-7788-XYGnYGwVEn@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-264426-7788@https.bugs.freebsd.org/bugzilla/> References: <bug-264426-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D264426 --- Comment #2 from p5B2EA84B3@t-online.de --- from https://docs.freebsd.org/en/books/porters-handbook/security/#security-notify 12.3. Keeping the Community Informed 12.3.1. The VuXML Database A very important and urgent step to take as early after a security vulnerability is discovered as possible is to notify the community of port users about the jeopardy. Such notification serves two purposes. ... What is the reason that mitmproxy still has no entry in the FreeBSD VuXML database? The trust in the FreeBSD VuXML database suffers if entries are delayed. --=20 You are receiving this mail because: You are on the CC list for the bug. You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-264426-7788-XYGnYGwVEn>