Date: Mon, 10 Apr 2023 18:33:13 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 270744] 20 VuXML new entries for vulnerable ports Message-ID: <bug-270744-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270744 Bug ID: 270744 Summary: 20 VuXML new entries for vulnerable ports Product: Ports & Packages Version: Latest Hardware: Any URL: https://github.com/HubTou/pysec2vuxml OS: Any Status: New Keywords: security Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: hubert.tournier@gmail.com CC: 0mp@FreeBSD.org, amzo1337@gmail.com, contato@kanazuchi.com, dvl@FreeBSD.org, philip@FreeBSD.org, ports-secteam@FreeBSD.org, ports@FreeBSD.org, python@FreeBSD.org, sunpoet@FreeBSD.org, swills@FreeBSD.org, yuri@freebsd.org CC: ports-secteam@FreeBSD.org Created attachment 241403 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D241403&action= =3Dedit 20 VuXML new entries for vulnerable ports A second batch of new VuXML entries for vulnerable ports discovered with pysec2vuxml (see https://github.com/HubTou/pysec2vuxml). Others will follow as soon as possible. Entries were verified with: # cd /usr/ports/security/vuxml # make validate Here are the ports affected with their respective maintainers: ---------------------------------------------------------------------------= ---------------------------------- Vulns Package Port path Port name Po= rt version Maintainer=20=20=20=20=20=20=20=20=20=20=20=20=20 ---------------------------------------------------------------------------= ---------------------------------- 2 cinder misc/py-cinder py39-cinder=20=20=20=20= =20=20=20=20=20=20=20 12.0.10_22 sunpoet@FreeBSD.org=20=20=20=20 2 tflite misc/py-tflite py39-tflite 2.= 3.0=20 yuri@FreeBSD.org=20=20=20=20=20=20=20 2 impacket net/py-impacket py39-impacket=20=20=20=20= =20=20=20=20=20 0.9.17_1 contato@kanazuchi.com=20=20 1 suds net/py-suds py39-suds 1.= 1.2=20 sunpoet@FreeBSD.org=20=20=20=20 1 slixmpp net-im/py-slixmpp py39-slixmpp 1.= 7.1=20 0mp@FreeBSD.org=20=20=20=20=20=20=20=20 1 nicotine-plus net-p2p/py-nicotine-plus py39-nicotine-plus=20=20= =20=20 3.2.0_1 ports@FreeBSD.org=20=20=20=20=20=20 1 pymatgen science/py-pymatgen py39-pymatgen=20=20=20=20= =20=20=20=20=20 2022.7.19 yuri@FreeBSD.org=20=20=20=20=20=20=20 3 tensorflow science/py-tensorflow py39-tensorflow=20=20=20= =20=20=20=20 2.9.1_5 amzo1337@gmail.com=20=20=20=20=20 2 cryptography security/py-cryptography py39-cryptography=20=20= =20=20=20 3.4.8_1,1 sunpoet@FreeBSD.org=20=20=20=20 1 kerberos security/py-kerberos py39-kerberos 1.= 3.1=20 dvl@FreeBSD.org=20=20=20=20=20=20=20=20 6 pysaml2 security/py-pysaml24 py39-pysaml24=20=20=20=20= =20=20=20=20=20 4.9.0_1 sunpoet@FreeBSD.org=20=20=20=20 3 ansible sysutils/ansible py39-ansible 7.= 1.0=20 0mp@FreeBSD.org=20=20=20=20=20=20=20=20 2 psutil sysutils/py-psutil121 py39-psutil121=20=20=20= =20=20=20=20=20 1.2.1_2 swills@FreeBSD.org=20=20=20=20=20 1 beaker www/py-beaker py39-beaker 1.= 12.1 python@FreeBSD.org=20=20=20=20=20=20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D Python packages's FreeBSD ports =3D 4127 vulnerable ports =3D 41 (14 in this batch) vulnerable ports/version =3D 46 (14 in this batch) vulnerabilities =3D 140 (28 in this batch) ---------------------------------------------------------------------------= ---------------------------------- --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-270744-7788>