Date: Mon, 3 Mar 2014 03:45:51 -0600 From: JEREMY COX <jeremy.m.cox@gmail.com> To: koobs@freebsd.org, freebsd-python@freebsd.org Subject: Re: pyhon33 still listed as vulnerable Message-ID: <CAPH9q1pv5YnSVLjDZwYsH1LoQS-sHiVBiHiKL1LnEkEYa16Y3g@mail.gmail.com> In-Reply-To: <53143F24.500@FreeBSD.org> References: <CAPH9q1p0vzjzmhyeQKqMp=JWp22sMJPSa4vBywEcgAgYuKojqA@mail.gmail.com> <B09BA639-565A-40C6-A5E1-46555213BE8B@gmail.com> <53142DA3.9000604@gmail.com> <53143F24.500@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
pkg audit -F was the correct solution. Thank you very much for the assistance! Regards, Jeremy On Mon, Mar 3, 2014 at 2:36 AM, Kubilay Kocak <koobs.freebsd@gmail.com>wrote: > On 3/03/2014 6:22 PM, Andrew Berg wrote: > > On 2014.03.03 01:20, Dmitry Sivachenko wrote: > >> I already fixed that yesterday, update your ports tree. > > I have this issue as well on a fresh ports tree. > > Does updating the vulnerability database help? Either via: > > pkg audit -F if using pkg, or portaudit -F if using portaudit > > >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPH9q1pv5YnSVLjDZwYsH1LoQS-sHiVBiHiKL1LnEkEYa16Y3g>