On 05/01/14 06:08, Dewayne Geraghty wrote:
> We updated strongswan yesterday and noticed in their changelog the
> resolution of CVE2014-2338 in strongswan 5.1.3 which was  released on
> 14th April '14.  Secunia advises that this has a "moderately critical"
> rating.
> 
> I've examined the references below and other web searching, but haven't
> been able to find a way to "notify" the portaudit mechanism of a port
> vulnerability.

Portaudit data derives from vuxml -- your best bet here is to prod the
port's maintainer preferably by means of a PR.  Make it clear this is a
security fix.  The maintainer should supply a patch to vuln.xml as part
of the update to 5.1.3, or else the committer should add one.

Alternatively, and if you don't get a timely response from the
maintainer, bring up the issue on the freebsd-ports@.... mailing list,
which you've done.

        Cheers,

        Matthew


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to