Date: Tue, 26 May 2015 11:56:29 -0500 From: Mark Felder <feld@FreeBSD.org> To: freebsd-ports@freebsd.org Subject: Re: New pkg audit / vuln.xml failures (php55, unzoo) Message-ID: <1432659389.3130746.278522905.6D1E6549@webmail.messagingengine.com> In-Reply-To: <20150523153029.B7BD3280@hub.freebsd.org> References: <alpine.BSF.2.11.1505171402430.52815@eboyr.pbz> <20150523153029.B7BD3280@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, May 23, 2015, at 10:30, Roger Marquis wrote: > > If you find a vulnerability such as a new CVE or mailing list > announcement please send it to the port maintainer and > <ports-secteam@FreeBSD.org> as quickly as possible. They are whoefully > understaffed and need our help. Who is "ports-secteam"? There has been no Call For Help that I've ever seen. If people are needed to process these CVEs so they are entered into VUXML, sign me up to ports-secteam please.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1432659389.3130746.278522905.6D1E6549>