Date: Sat, 27 Aug 2011 20:07:10 +0200 From: "Uffe R. B. Andersen" <urb@twe.net> To: freebsd-ports@freebsd.org Subject: Re: mail/postfix-policyd-spf relies on vulnerable mail/libspf2-10 Message-ID: <4E59324E.5070602@twe.net> In-Reply-To: <4E580082.1030202@FreeBSD.org> References: <4E57FBC1.1020009@FreeBSD.org> <4E580082.1030202@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Den 26-08-2011 22:22, Doug Barton skrev: > Howdy, > > Doing some port updates and noticed that mail/postfix-policyd-spf > relies on mail/libspf2-10, which according to > http://portaudit.FreeBSD.org/2ddbfd29-a455-11dd-a55e-00163e000016.html > > is vulnerable. There is a port of mail/libspf2 which is not vulnerable, > is it possible to update mail/postfix-policyd-spf to rely on it > instead? libspf2 port is currently libspf2-1.2.9_1 and according to the page you refer to, the vulnerability affects libspf2 <1.2.8. - -- Med venlig hilsen - Sincerely Uffe R. B. Andersen - mailto:urb@twe.net http://blog.andersen.nu/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.12 (MingW32) iEYEARECAAYFAk5ZMk4ACgkQxC95nUQcrphdDACgylOM4Jw4D+JHh4aHbI1e6Lgy XgoAoMk09edbD58jkuD4Noar+boPiSmI =TRMu -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E59324E.5070602>