Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 24 Jun 2021 11:22:01 +0000
From:      bugzilla-noreply@freebsd.org
To:        pkg@FreeBSD.org
Subject:   [Bug 256236] ports-mgmt/pkg: audit command didn't work properly with port epoch
Message-ID:  <bug-256236-32340-JXHXshTazs@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-256236-32340@https.bugs.freebsd.org/bugzilla/>
References:  <bug-256236-32340@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D256236

Philip Paeps <philip@FreeBSD.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|New                         |Closed
         Resolution|---                         |Overcome By Events
                 CC|                            |philip@FreeBSD.org

--- Comment #1 from Philip Paeps <philip@FreeBSD.org> ---
% pkg audit nginx-1.20.0_2,2
nginx-1.20.0_2,2 is vulnerable:
  NGINX -- 1-byte memory overwrite in resolver
  CVE: CVE-2021-23017
  WWW:
https://vuxml.FreeBSD.org/freebsd/0882f019-bd60-11eb-9bdd-8c164567ca3c.html

1 problem(s) in 1 installed package(s) found.

I suspect your vuln.xml file is/was out of date.  This was fixed in
c2a2f2b35ad4:
https://cgit.freebsd.org/ports/commit/?id=3Dc2a2f2b35ad4

Note that because of a syntax error introduced in c7737d4b2e5d on 2021-06-1=
0,
the vuln.xml file has not been updated until approximately an hour ago.  The
build was fixed in 46119dd553f1:
https://cgit.freebsd.org/ports/commit/?id=3D46119dd553f18833b20a76623029a24=
dd4948c58

See also #256789

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-256236-32340-JXHXshTazs>