Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 30 Jun 2017 10:18:40 -0600
From:      Adam Weinberger <adamw@adamw.org>
To:        Jos Chrispijn <bsdports@cloudzeeland.nl>
Cc:        FreeBSD Ports ML <freebsd-ports@freebsd.org>, cpm@FreeBSD.org
Subject:   Re: Vulnerability
Message-ID:  <FEA32EF9-DAD3-4FAB-975D-67D785041951@adamw.org>
In-Reply-To: <6d826a0d-b54c-ef9d-88d3-bdf4f159c434@cloudzeeland.nl>
References:  <6d826a0d-b54c-ef9d-88d3-bdf4f159c434@cloudzeeland.nl>

next in thread | previous in thread | raw e-mail | index | archive | help
> On 30 Jun, 2017, at 10:04, Jos Chrispijn <bsdports@cloudzeeland.nl> =
wrote:
>=20
> Dear port maintainer,
>=20
> Just to let you know that I ran into the following vulenerability =
report:
>=20
> libgcrypt-1.7.7 is vulnerable:
> libgcrypt -- side-channel attack on RSA secret keys
> CVE: CVE-2017-7526
> =
WWW:https://vuxml.FreeBSD.org/freebsd/ed3bf433-5d92-11e7-aa14-e8e0b747a45a=
.html
>=20
> Could you send out a port update? Thanks in advance!
>=20
> Keep up the good work,
> Jos Chrispijn

Hi Jos,

See https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220382

It's in the exp-run queue.

# Adam


--=20
Adam Weinberger
adamw@adamw.org
https://www.adamw.org




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?FEA32EF9-DAD3-4FAB-975D-67D785041951>