From nobody Mon May 24 09:56:34 2021 X-Original-To: freebsd-pkg@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id A91FF9F704C for <freebsd-pkg@mlmmj.nyi.freebsd.org>; Mon, 24 May 2021 09:56:44 +0000 (UTC) (envelope-from bsdpkg@cloudzeeland.nl) Received: from poseidon.cloudzeeland.nl (cloudzeeland.xs4all.nl [83.161.133.58]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "cloudzeeland.nl", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4FpXfz5Mdhz4jqj for <freebsd-pkg@freebsd.org>; Mon, 24 May 2021 09:56:42 +0000 (UTC) (envelope-from bsdpkg@cloudzeeland.nl) Received: from poseidon.cloudzeeland.nl (cloudzeeland.nl [10.10.10.36]) by poseidon.cloudzeeland.nl (Postfix) with ESMTP id C3D2534B63 for <freebsd-pkg@freebsd.org>; Mon, 24 May 2021 11:56:34 +0200 (CEST) Received: from [10.10.10.34] (pion1.rpicloud.nl [82.176.127.71]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by poseidon.cloudzeeland.nl (Postfix) with ESMTPSA id 9915334BB7 for <freebsd-pkg@freebsd.org>; Mon, 24 May 2021 11:56:34 +0200 (CEST) To: freebsd-pkg@freebsd.org From: Tilly <bsdpkg@cloudzeeland.nl> Subject: MySQL 8.0 package Message-ID: <0d4df408-b249-829f-ab95-ea1a5abd8380@cloudzeeland.nl> Date: Mon, 24 May 2021 11:56:34 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 List-Id: Binary package management and package tools discussion <freebsd-pkg.freebsd.org> List-Archive: https://lists.freebsd.org/archives/freebsd-pkg List-Help: <mailto:freebsd-pkg+help@freebsd.org> List-Post: <mailto:freebsd-pkg@freebsd.org> List-Subscribe: <mailto:freebsd-pkg+subscribe@freebsd.org> List-Unsubscribe: <mailto:freebsd-pkg+unsubscribe@freebsd.org> Sender: owner-freebsd-pkg@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-GB X-Virus-Scanned: ClamAV using ClamSMTP X-Rspamd-Queue-Id: 4FpXfz5Mdhz4jqj X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of bsdpkg@cloudzeeland.nl designates 83.161.133.58 as permitted sender) smtp.mailfrom=bsdpkg@cloudzeeland.nl X-Spamd-Result: default: False [-1.30 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; RBL_DBL_DONT_QUERY_IPS(0.00)[83.161.133.58:from]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-pkg@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; SPAMHAUS_ZRD(0.00)[83.161.133.58:from:127.0.2.255]; RCVD_COUNT_THREE(0.00)[3]; ARC_NA(0.00)[]; NEURAL_SPAM_SHORT(1.00)[1.000]; NEURAL_HAM_LONG(-1.00)[-0.999]; DMARC_NA(0.00)[cloudzeeland.nl]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:3265, ipnet:83.160.0.0/14, country:NL]; RCVD_TLS_LAST(0.00)[]; MAILMAN_DEST(0.00)[freebsd-pkg] Dear team, I noticed that the current mysql80-server-8.0.23_1 is due to vulnerabilities for quite some time. mysql80-server-8.0.23 is vulnerable: MySQL -- Multiple vulnerabilities CVE: CVE-2021-2232 CVE: CVE-2021-2308 CVE: CVE-2021-2301 CVE: CVE-2021-2162 CVE: CVE-2021-2171 CVE: CVE-2021-2174 Have notified the package maintainer, but so far no response read yet. Can you tell us when the package update will be released? Thanks and keep up the good work. Best, Tilly