(Sent to -questions@ on Oct 3 but hadn't got any reply, so sending
to @ports now. Also, situation below is before www/firefox was
updated to 41.0.)

I want to know if running "pkg audit" makes any sense for a port
installed that has not been updated officially yet. Also, is it
possible to supplement the vuxml catalog for such ports installed?

Firefox 39 or 40 had been installed from ports. I got tired of
seeing package being vulnerable on every ports tree update process
that rebuilds "security/vuxml". As the "www/firefox" port has not
been updated yet, so I fetched source of firefox 41.0.1; updated
distinfo; installed (after rebuilding databases/sqlite3 with DBSTAT
option & moving out "files/patch-bug702179" out of "files").

Now I see vulnerability warnings going back to 2004, which are
just useless & rather amusing. At least the installed firefox is not
vulnerable any more (yet).

Apparently per pkg-version

  # pkg version -t 41.0.1 41.0,1
  <

... & ...

  https://vuxml.freebsd.org/freebsd/2d56c7f4-b354-428f-8f48-38150c607a05.html


... 41.0.1 is still vulnerable. But according to ...

  https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/

... there are no outstanding vulnerabilities.

Now I am confused.


-- 

_______________________________________________
freebsd-ports@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscr...@freebsd.org"

Reply via email to