Date: Wed, 30 Mar 2016 18:24:10 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 208404] [patch] net/openvswitch CVE-2016-2074 Message-ID: <bug-208404-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D208404 Bug ID: 208404 Summary: [patch] net/openvswitch CVE-2016-2074 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Keywords: patch, security Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: kevlo@FreeBSD.org Reporter: ohauer@FreeBSD.org Keywords: patch Assignee: kevlo@FreeBSD.org Flags: maintainer-feedback?(kevlo@FreeBSD.org), merge-quarterly? Created attachment 168794 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D168794&action= =3Dedit patch lib/flow.c I just read about an issue on openvswitch (CVE-2016-2074) but there is a si= mple patch and also already a new 2.3.3 release available [1] I shaped only the patch from the CVE announcement [1] and tested a quick bu= ild, not functionality testing was made=20 [1] http://openvswitch.org/pipermail/announce/2016-March/000082.html --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-208404-13>