Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 29 Mar 2016 19:54:55 +0000
From:      bugzilla-noreply@freebsd.org
To:        emulation@FreeBSD.org
Subject:   [Bug 208385] security/linux-c6-nss needs updating to resolve vulnerabilities
Message-ID:  <bug-208385-4077@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D208385

            Bug ID: 208385
           Summary: security/linux-c6-nss needs updating to resolve
                    vulnerabilities
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Keywords: security
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: emulation@FreeBSD.org
          Reporter: mi@FreeBSD.org
             Flags: maintainer-feedback?(emulation@FreeBSD.org)
          Assignee: emulation@FreeBSD.org

The port is currently failing due to two vulnerabilities:
https://vuxml.FreeBSD.org/freebsd/c4292768-5273-4f17-a267-c5fe35125ce4.html
https://vuxml.FreeBSD.org/freebsd/75091516-6f4b-4059-9884-6727023dc366.html

Both were filed on March 8th, and both were addressed by RedHat/CentOS the =
next
day with:=20
http://rhn.redhat.com/errata/RHSA-2016-0370.html

The change for the port is simple enough -- just replace -2 with -5 in the
nss-util RPM-version and update distinfo-files.

But vuln.xml is harder...

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-208385-4077>