Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 3 Mar 2014 03:45:51 -0600
From:      JEREMY COX <jeremy.m.cox@gmail.com>
To:        koobs@freebsd.org, freebsd-python@freebsd.org
Subject:   Re: pyhon33 still listed as vulnerable
Message-ID:  <CAPH9q1pv5YnSVLjDZwYsH1LoQS-sHiVBiHiKL1LnEkEYa16Y3g@mail.gmail.com>
In-Reply-To: <53143F24.500@FreeBSD.org>
References:  <CAPH9q1p0vzjzmhyeQKqMp=JWp22sMJPSa4vBywEcgAgYuKojqA@mail.gmail.com> <B09BA639-565A-40C6-A5E1-46555213BE8B@gmail.com> <53142DA3.9000604@gmail.com> <53143F24.500@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
pkg audit -F was the correct solution. Thank you very much for the
assistance!

Regards,
Jeremy


On Mon, Mar 3, 2014 at 2:36 AM, Kubilay Kocak <koobs.freebsd@gmail.com>wrote:

> On 3/03/2014 6:22 PM, Andrew Berg wrote:
> > On 2014.03.03 01:20, Dmitry Sivachenko wrote:
> >> I already fixed that yesterday, update your ports tree.
> > I have this issue as well on a fresh ports tree.
>
> Does updating the vulnerability database help? Either via:
>
> pkg audit -F if using pkg, or portaudit -F if using portaudit
>
>
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPH9q1pv5YnSVLjDZwYsH1LoQS-sHiVBiHiKL1LnEkEYa16Y3g>