Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 May 2015 11:56:29 -0500
From:      Mark Felder <feld@FreeBSD.org>
To:        freebsd-ports@freebsd.org
Subject:   Re: New pkg audit / vuln.xml failures (php55, unzoo)
Message-ID:  <1432659389.3130746.278522905.6D1E6549@webmail.messagingengine.com>
In-Reply-To: <20150523153029.B7BD3280@hub.freebsd.org>
References:  <alpine.BSF.2.11.1505171402430.52815@eboyr.pbz> <20150523153029.B7BD3280@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On Sat, May 23, 2015, at 10:30, Roger Marquis wrote:
>
> If you find a vulnerability such as a new CVE or mailing list
> announcement please send it to the port maintainer and
> <ports-secteam@FreeBSD.org> as quickly as possible.  They are whoefully
> understaffed and need our help.  

Who is "ports-secteam"? There has been no Call For Help that I've ever
seen. If people are needed to process these CVEs so they are entered
into VUXML, sign me up to ports-secteam please.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1432659389.3130746.278522905.6D1E6549>