MFH: r392451
Bump PORTREVISION of the client and add pkg-message to warn about CVE-2015-3152 which will not get patched Security: CVE-2015-3152 Security: 36bd352d-299b-11e5-86ff-14dae9d210b8 Approved by: ports-secteam (with hat)
This commit is contained in:
parent
bda777f359
commit
28d5949290
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/branches/2015Q3/; revision=392459
@ -2,6 +2,7 @@
|
||||
|
||||
PORTNAME= mariadb
|
||||
PKGNAMESUFFIX= 53-client
|
||||
PORTREVISION= 7
|
||||
|
||||
UNIQUENAME= ${PORTNAME}${PKGNAMESUFFIX}
|
||||
|
||||
@ -24,6 +25,7 @@ CONFLICTS= mariadb5[4-9]-client-* \
|
||||
|
||||
PATCHDIR= ${.CURDIR}/files
|
||||
PLIST= ${.CURDIR}/pkg-plist
|
||||
PKGMESSAGE= ${.CURDIR}/pkg-message
|
||||
|
||||
MANS= mysql_config.1 mysql_upgrade.1 mysql.1 mysqladmin.1 \
|
||||
mysqlbinlog.1 mysqlbug.1 mysqlcheck.1 \
|
||||
|
15
databases/mariadb-client/pkg-message
Normal file
15
databases/mariadb-client/pkg-message
Normal file
@ -0,0 +1,15 @@
|
||||
* * * * * * * * * * * * * * * * * * * * * * * *
|
||||
|
||||
Please be aware the database client is vulnerable
|
||||
to CVE-2015-3152 - SSL Downgrade aka "BACKRONYM".
|
||||
You may find more information at the following URL:
|
||||
|
||||
http://www.vuxml.org/freebsd/36bd352d-299b-11e5-86ff-14dae9d210b8.html
|
||||
|
||||
Although this database client is not listed as
|
||||
"affected", it is vulnerable and will not be
|
||||
receiving a patch. Please take note of this when
|
||||
deploying this software.
|
||||
|
||||
* * * * * * * * * * * * * * * * * * * * * * * *
|
||||
|
@ -2,7 +2,7 @@
|
||||
|
||||
PORTNAME= mariadb
|
||||
PORTVERSION= 5.3.12
|
||||
PORTREVISION= 6
|
||||
PORTREVISION?= 6
|
||||
CATEGORIES= databases ipv6
|
||||
MASTER_SITES= http://ftp.osuosl.org/pub/mariadb/${PORTNAME}-${PORTVERSION}/kvm-tarbake-jaunty-x86/ \
|
||||
http://mirrors.supportex.net/mariadb/${PORTNAME}-${PORTVERSION}/kvm-tarbake-jaunty-x86/ \
|
||||
|
Loading…
Reference in New Issue
Block a user