From owner-freebsd-pkg@freebsd.org Wed Aug 28 09:36:38 2019 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 896F2D7291 for ; Wed, 28 Aug 2019 09:36:38 +0000 (UTC) (envelope-from bsdports@cloudzeeland.nl) Received: from poseidon.cloudzeeland.nl (cloudzeeland.xs4all.nl [83.161.133.58]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "cloudzeeland.nl", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46JLGr6Ld6z40M6 for ; Wed, 28 Aug 2019 09:36:36 +0000 (UTC) (envelope-from bsdports@cloudzeeland.nl) Received: from poseidon.cloudzeeland.nl (cloudzeeland.nl [10.10.10.36]) by poseidon.cloudzeeland.nl (Postfix) with ESMTP id EEB032B0998 for ; Wed, 28 Aug 2019 11:36:25 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cloudzeeland.nl; s=cloud; t=1566984986; bh=56p7jRUzVsbPWCYSdszpPJVv/v+GAg+k6lrbQnMkIiY=; h=To:From:Subject:Date; b=BiajuV5NTz33Bz7eqbwx9Kw5cq6ZaH8wDWOuuex51T64mwHj2hTdO81CmF7wfi9Og ejmwJ9JlZKyHLlVaYQdMvXWgNHbS7nA4JxPXrinYrf/02A5u1oxl0y7ZtfnqT4/x2C +pI+f4o8pkbskplD8rnaS7DnyeqEbqZrAJwqjF4g= Received: from [10.10.10.34] (pion1.rpicloud.nl [82.176.127.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by poseidon.cloudzeeland.nl (Postfix) with ESMTPSA id 84BE72B0997 for ; Wed, 28 Aug 2019 11:36:25 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cloudzeeland.nl; s=cloud; t=1566984985; bh=56p7jRUzVsbPWCYSdszpPJVv/v+GAg+k6lrbQnMkIiY=; h=To:From:Subject:Date; b=bhYR9xQ431lIYcIOzdrTsf5CZy3yU7vXSpKKwgjQlEN6XTULCwZBFBNxu/uvidrzy kDlnDbarpeGyaWChOSTBC7fXDDf9j9ljrXy01UMocarMEVc11ao1ZSXuPziAW+DyNk SVbsn+0NoicYilU9GQj0Z8lWVMTR7PcP7L7cUYdI= To: freebsd-pkg@freebsd.org From: Jos Chrispijn Subject: Packages with security vulnerabilities (3x) Message-ID: <8f257614-efe2-7c8b-63f1-cb386807185a@cloudzeeland.nl> Date: Wed, 28 Aug 2019 11:36:27 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-GB X-Virus-Scanned: ClamAV using ClamSMTP on poseidon.cloudzeeland.nl X-Rspamd-Queue-Id: 46JLGr6Ld6z40M6 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=cloudzeeland.nl header.s=cloud header.b=BiajuV5N; dkim=pass header.d=cloudzeeland.nl header.s=cloud header.b=bhYR9xQ4; dmarc=none; spf=pass (mx1.freebsd.org: domain of bsdports@cloudzeeland.nl designates 83.161.133.58 as permitted sender) smtp.mailfrom=bsdports@cloudzeeland.nl X-Spamd-Result: default: False [-3.67 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[cloudzeeland.nl:s=cloud]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+a]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-pkg@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[cloudzeeland.nl]; DKIM_TRACE(0.00)[cloudzeeland.nl:+]; NEURAL_HAM_SHORT(-0.88)[-0.885,0]; IP_SCORE(-0.29)[ipnet: 83.160.0.0/14(-1.33), asn: 3265(-0.12), country: NL(0.01)]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:3265, ipnet:83.160.0.0/14, country:NL]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2019 09:36:38 -0000 Dear maintainer(s), Can you pls update the following packages: Database fetched: Tue Aug 27 01:14:30 CEST 2019 apache24-2.4.39_1 is vulnerable: Apache -- Multiple vulnerabilities CVE: CVE-2019-10082 CVE: CVE-2019-10092 CVE: CVE-2019-10098 CVE: CVE-2019-9517 CVE: CVE-2019-10081 WWW:https://vuxml.FreeBSD.org/freebsd/caf545f2-c0d9-11e9-9051-4c72b94353b5.html libnghttp2-1.39.1 is vulnerable: nghttp2 -- multiple vulnerabilities CVE: CVE-2019-9513 CVE: CVE-2019-9511 WWW:https://vuxml.FreeBSD.org/freebsd/121fec01-c042-11e9-a73f-b36f5969f162.html mysql57-server-5.7.26_1 is vulnerable: MySQL -- Multiple vulerabilities CVE: CVE-2019-3822 CVE: CVE-2019-2879 CVE: CVE-2019-2834 CVE: CVE-2019-2830 CVE: CVE-2019-2826 CVE: CVE-2019-2822 CVE: CVE-2019-2819 CVE: CVE-2019-2815 CVE: CVE-2019-2814 CVE: CVE-2019-2812 CVE: CVE-2019-2811 CVE: CVE-2019-2810 CVE: CVE-2019-2808 CVE: CVE-2019-2805 CVE: CVE-2019-2803 CVE: CVE-2019-2802 CVE: CVE-2019-2801 CVE: CVE-2019-2800 CVE: CVE-2019-2798 CVE: CVE-2019-2797 CVE: CVE-2019-2796 CVE: CVE-2019-2795 CVE: CVE-2019-2791 CVE: CVE-2019-2789 CVE: CVE-2019-2785 CVE: CVE-2019-2784 CVE: CVE-2019-2780 CVE: CVE-2019-2778 CVE: CVE-2019-2774 CVE: CVE-2019-2758 CVE: CVE-2019-2757 CVE: CVE-2019-2755 CVE: CVE-2019-2752 CVE: CVE-2019-2747 CVE: CVE-2019-2746 CVE: CVE-2019-2743 CVE: CVE-2019-2741 CVE: CVE-2019-2740 CVE: CVE-2019-2739 CVE: CVE-2019-2738 CVE: CVE-2019-2737 CVE: CVE-2019-2731 CVE: CVE-2019-2730 WWW:https://vuxml.FreeBSD.org/freebsd/198e6220-ac8b-11e9-a1c7-b499baebfeaf.html 3 problem(s) in 3 installed package(s) found. Thanks and keep up the good work! Jos Chrispijn