From owner-freebsd-questions@FreeBSD.ORG Sun Mar 16 17:52:22 2014 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 7E3B5C58 for ; Sun, 16 Mar 2014 17:52:22 +0000 (UTC) Received: from vms173019pub.verizon.net (vms173019pub.verizon.net [206.46.173.19]) by mx1.freebsd.org (Postfix) with ESMTP id 55AB518D for ; Sun, 16 Mar 2014 17:52:21 +0000 (UTC) Received: from yeaguy.com ([unknown] [173.60.122.163]) by vms173019.mailsrvcs.net (Sun Java(tm) System Messaging Server 7u2-7.02 32bit (built Apr 16 2009)) with ESMTPA id <0N2J00CWTIZ2HJ50@vms173019.mailsrvcs.net> for freebsd-questions@freebsd.org; Sun, 16 Mar 2014 12:52:19 -0500 (CDT) Received: from yeaguy.com (localhost [127.0.0.1]) by yeaguy.com (Postfix) with ESMTP id 683431126FF for ; Sun, 16 Mar 2014 10:52:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at yeaguy.com Received: from yeaguy.com ([127.0.0.1]) by yeaguy.com (yeaguy.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QOgKBMRMEzKa for ; Sun, 16 Mar 2014 10:52:13 -0700 (PDT) Received: from [192.168.1.8] (sabertooth.home [192.168.1.8]) by yeaguy.com (Postfix) with ESMTPSA id 7A0CD1126DC for ; Sun, 16 Mar 2014 10:52:13 -0700 (PDT) Message-id: <5325E4CB.3070103@yeaguy.com> Date: Sun, 16 Mar 2014 10:52:11 -0700 From: jv User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.3.0 MIME-version: 1.0 To: freebsd-questions@freebsd.org Subject: Re: security vulnerabilities References: <5325B8FB.6040903@yeaguy.com> <5325E339.6040206@qeng-ho.org> In-reply-to: <5325E339.6040206@qeng-ho.org> Content-type: text/plain; charset=ISO-8859-1; format=flowed Content-transfer-encoding: 7bit X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Mar 2014 17:52:22 -0000 On 3/16/2014 10:45 AM, Arthur Chance wrote: > On 16/03/2014 14:45, jv wrote: >> Hi - What is the safest way to handle fixing this python vulnerability >> Im seeing? >> >> portmaster -r python27-2.7.6_2 ?? >> >> Checking for packages with security vulnerabilities: >> chromium-32.0.1700.107 >> firefox-26.0,1 >> freetype2-2.5.2 >> python27-2.7.6_2 >> >> >> Thanks, >> >> jv >> >> Checking for packages with security vulnerabilities: >> chromium-32.0.1700.107 >> firefox-26.0,1 >> freetype2-2.5.2 >> python27-2.7.6_2 >> > > How about upgrading to the current versions of all of those. I don't > have chromium installed but for the rest (on a machine that was last > updated a week ago) > > arthur> pkg info python27 firefox freetype2 > python27-2.7.6_4 > firefox-27.0.1,1 > freetype2-2.5.3 > > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to > "freebsd-questions-unsubscribe@freebsd.org" I portmaster'd freetype and that upgraded python: [vic@yeaguy ~] pkg audit 0 problem(s) in the installed packages found. chromium portmaster failed, i updated the ports too, trying a make deinstall && make reinstall on chromium: we'll see if it fails.. i dont really use X but we shall see.