MFH: r392451

Bump PORTREVISION of the client and add pkg-message to warn about
CVE-2015-3152 which will not get patched

Security:	CVE-2015-3152
Security:	36bd352d-299b-11e5-86ff-14dae9d210b8
Approved by:	ports-secteam (with hat)
This commit is contained in:
Mark Felder 2015-07-18 21:34:03 +00:00
parent bda777f359
commit 28d5949290
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/branches/2015Q3/; revision=392459
3 changed files with 18 additions and 1 deletions

View File

@ -2,6 +2,7 @@
PORTNAME= mariadb
PKGNAMESUFFIX= 53-client
PORTREVISION= 7
UNIQUENAME= ${PORTNAME}${PKGNAMESUFFIX}
@ -24,6 +25,7 @@ CONFLICTS= mariadb5[4-9]-client-* \
PATCHDIR= ${.CURDIR}/files
PLIST= ${.CURDIR}/pkg-plist
PKGMESSAGE= ${.CURDIR}/pkg-message
MANS= mysql_config.1 mysql_upgrade.1 mysql.1 mysqladmin.1 \
mysqlbinlog.1 mysqlbug.1 mysqlcheck.1 \

View File

@ -0,0 +1,15 @@
* * * * * * * * * * * * * * * * * * * * * * * *
Please be aware the database client is vulnerable
to CVE-2015-3152 - SSL Downgrade aka "BACKRONYM".
You may find more information at the following URL:
http://www.vuxml.org/freebsd/36bd352d-299b-11e5-86ff-14dae9d210b8.html
Although this database client is not listed as
"affected", it is vulnerable and will not be
receiving a patch. Please take note of this when
deploying this software.
* * * * * * * * * * * * * * * * * * * * * * * *

View File

@ -2,7 +2,7 @@
PORTNAME= mariadb
PORTVERSION= 5.3.12
PORTREVISION= 6
PORTREVISION?= 6
CATEGORIES= databases ipv6
MASTER_SITES= http://ftp.osuosl.org/pub/mariadb/${PORTNAME}-${PORTVERSION}/kvm-tarbake-jaunty-x86/ \
http://mirrors.supportex.net/mariadb/${PORTNAME}-${PORTVERSION}/kvm-tarbake-jaunty-x86/ \