Date: Tue, 5 May 2020 08:40:23 +1000 From: Dewayne Geraghty <dewayne@heuristicsystems.com.au> To: "Kurt Buff - GSEC, GCIH" <kurt.buff@gmail.com> Cc: ports@freebsd.org Subject: Re: FreeBSD Port: open-vm-tools-11.0.1_3,2 Message-ID: <b68b8398-4534-8628-d7d7-30dc2cb4116b@heuristicsystems.com.au> In-Reply-To: <CADy1Ce5s79X-YUPKW3RH4gtyJHc212FiHZdiob1vgdS7_nvuuw@mail.gmail.com> References: <000001d61e62$52544110$f6fcc330$@quicknet.nl> <CADy1Ce5s79X-YUPKW3RH4gtyJHc212FiHZdiob1vgdS7_nvuuw@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Suggest that you add to make.conf DISABLE_VULNERABILITIES=yes On 5/05/2020 8:08 am, Kurt Buff - GSEC, GCIH wrote: > All, > > Has been done? > > I just built a new machine on our VMware cluster and tried to install this > from ports on 12.1-RELEASE-p3 with an updated tree, and it complained about > a dependency: > > ===> python27-2.7.17_1 has known vulnerabilities: > python27-2.7.17_1 is vulnerable: > Python -- Regular Expression DoS attack against client > CVE: CVE-2020-8492 > WWW: > https://vuxml.FreeBSD.org/freebsd/a27b0bb6-84fc-11ea-b5b4-641c67a117d8.html > > Thanks, > > Kurt > > On Wed, Apr 29, 2020 at 2:11 PM Dutchman01 via freebsd-ports < > freebsd-ports@freebsd.org> wrote: > >> Hi, new maintenance release is out, >> >> this port could use an upstream release. >> >> >> >> Can you please upgrade the port? >> >> >> >> Ty , regards, >> >> dutchy >> >> _______________________________________________ >> freebsd-ports@freebsd.org mailing list >> https://lists.freebsd.org/mailman/listinfo/freebsd-ports >> To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org" >> > _______________________________________________ > freebsd-ports@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?b68b8398-4534-8628-d7d7-30dc2cb4116b>