Dear port maintainer,
The portscout new distfile checker has detected that one or more of your
ports appears to be out of date. Please take the opportunity to check
each of the ports listed below, and if possible and appropriate,
submit/commit an update. If any ports have already been updated,
On 26/05/2015 21:36, Timur I. Bakeyev wrote:
Well, it's all said in
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=177786.
I've added samba36-nmblookup as a courtesy for the xmbc/kodi project while ago
so it's not depend on full samba package, but now it's going too far in the
request to
Dear Enrico,
Thank you very much for your quick reply and for your explanation.
Kind regards
--
Albert Gabàs - Astabis
Information Risk Management
Barcelona: +34 931 980 181 | Madrid: +34 911 333 071
United Kingdom: +44 203 695 2195 | Israel: +97 248 847 344
-Mensaje original-
On 07/13/14 17:46, Michelle Sullivan wrote:
Baptiste Daroussin wrote:
On Mon, Jul 07, 2014 at 12:27:48AM +0200, olli hauer wrote:
On 2014-07-05 19:09, Bjoern A. Zeeb wrote:
Hi,
given ports@ ist listed as maintainer, you get the email. The Subject says it.
The world has moved on;
If you find a vulnerability such as a new CVE or mailing list
announcement please send it to the port maintainer and
ports-sect...@freebsd.org as quickly as possible. They are whoefully
understaffed and need our help.
Mark Felder wrote:
Who is ports-secteam?
It was Xin Li who alerted me to
On Wed, May 27, 2015, at 12:40, Roger Marquis wrote:
* perhaps as a result the vuln.xml database is no longer reliable, and
by extension,
* operators of FreeBSD servers (unlike Debian, Ubuntu, RedHat, Suse and
OpenBSD server operators) have no assurance that their systems are
I found the ports security reporting without issues
http://www.freebsd.org/security/reporting.html. Appears someone should
read reporting page Instead of saying information is not correct.
On May 27, 2015 12:40 PM, Roger Marquis marq...@roble.com wrote:
If you find a vulnerability such as a new
On 2015-05-27 16:18, Patrick Powell wrote:
On 07/13/14 17:46, Michelle Sullivan wrote:
Baptiste Daroussin wrote:
On Mon, Jul 07, 2014 at 12:27:48AM +0200, olli hauer wrote:
On 2014-07-05 19:09, Bjoern A. Zeeb wrote:
...snip..
One would have hoped that mod_perl2 would have had this
* operators of FreeBSD servers (unlike Debian, Ubuntu, RedHat, Suse and
OpenBSD server operators) have no assurance that their systems are
secure.
Slow down here for a second. Where's the command-line tool on RedHat or
Debian that lists only the known vulnerable packages?
In RedHat
Hi ,
I would like to test DHCPV6 using Dibbler (Client/Server/Relay ) tools. Could
anyone suggest regarding these package list for 9.1-PP2 RELEASE.
Thanks,
rajeev kalyan
___
freebsd-ports@freebsd.org mailing list
Mark Felder wrote:
Who is ports-secteam?
It was Xin Li who alerted me to the ports-sect...@freebsd.org address
i.e., as being distinct from the FreeBSD Security Team
(sect...@freebsd.org) address noted on
https://www.freebsd.org/security/.
Also have to thank Remko Lodder for pointing out
11 matches
Mail list logo