Date: Wed, 28 Aug 2019 12:24:31 +0200 From: =?UTF-8?Q?Ren=C3=A9_Ladan?= <r.c.ladan@gmail.com> To: Jos Chrispijn <bsdports@cloudzeeland.nl> Cc: freebsd-pkg@freebsd.org Subject: Re: Packages with security vulnerabilities (3x) Message-ID: <CADL2u4gse-1Zbn9mJ_iPeXs8Xq-OAuHu7_XfKay-AYA3L_bBPQ@mail.gmail.com> In-Reply-To: <8f257614-efe2-7c8b-63f1-cb386807185a@cloudzeeland.nl> References: <8f257614-efe2-7c8b-63f1-cb386807185a@cloudzeeland.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello Jos, Op wo 28 aug. 2019 om 11:36 schreef Jos Chrispijn <bsdports@cloudzeeland.nl= >: > > Dear maintainer(s), > > Can you pls update the following packages: > > Database fetched: Tue Aug 27 01:14:30 CEST 2019 > > apache24-2.4.39_1 is vulnerable: [...] > libnghttp2-1.39.1 is vulnerable: [...] > > mysql57-server-5.7.26_1 is vulnerable: [...] You will have to ask the maintainers to update the packages (ports actually, that is where the packages are built from), and then the updated binary packages will be available a few days later. This is the case if you follow "HEAD" packages, updates for quarterly packages (currently 2019Q3) need to be merged to the quarterly branch first before those binary packages can be rebuilt. This list is only for discussing the 'pkg' package itself. Ren=C3=A9
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADL2u4gse-1Zbn9mJ_iPeXs8Xq-OAuHu7_XfKay-AYA3L_bBPQ>