Why does the current security/openssl report with known vulnerabilities?
From the following URL http://portaudit.freebsd.org/5c5f19ce-43af-11e1-89b4-001ec9578670.html
then http://www.openssl.org/news/secadv_20120118.txt
As of 01/22 6:02 EST security/openssl is downloading 1.0.0g from distinfo:
Is distinfo not a valid method to figure out what version the port uses or should the portaudit auditfile be "openssl<1.0.0_9" not "openssl<1.0.0g"?
From the following URL http://portaudit.freebsd.org/5c5f19ce-43af-11e1-89b4-001ec9578670.html
Code:
Affects:
* openssl <1.0.0_9
then http://www.openssl.org/news/secadv_20120118.txt
Code:
Affected users should upgrade to OpenSSL 1.0.0g or 0.9.8t.
As of 01/22 6:02 EST security/openssl is downloading 1.0.0g from distinfo:
Code:
SHA256 (openssl-1.0.0g/openssl-1.0.0g.tar.gz) = 905106a1505e7d9f7c36ee81408d3aa3d41aac291a9603d0c290c9530c92fc2c
Is distinfo not a valid method to figure out what version the port uses or should the portaudit auditfile be "openssl<1.0.0_9" not "openssl<1.0.0g"?