Date: Mon, 4 May 2020 16:08:39 -0600 From: "Kurt Buff - GSEC, GCIH" <kurt.buff@gmail.com> To: Dutchman01 <dutchman01@quicknet.nl> Cc: jpaetzel@freebsd.org, ports@freebsd.org Subject: Re: FreeBSD Port: open-vm-tools-11.0.1_3,2 Message-ID: <CADy1Ce5s79X-YUPKW3RH4gtyJHc212FiHZdiob1vgdS7_nvuuw@mail.gmail.com> In-Reply-To: <000001d61e62$52544110$f6fcc330$@quicknet.nl> References: <000001d61e62$52544110$f6fcc330$@quicknet.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
All, Has been done? I just built a new machine on our VMware cluster and tried to install this from ports on 12.1-RELEASE-p3 with an updated tree, and it complained about a dependency: ===> python27-2.7.17_1 has known vulnerabilities: python27-2.7.17_1 is vulnerable: Python -- Regular Expression DoS attack against client CVE: CVE-2020-8492 WWW: https://vuxml.FreeBSD.org/freebsd/a27b0bb6-84fc-11ea-b5b4-641c67a117d8.html Thanks, Kurt On Wed, Apr 29, 2020 at 2:11 PM Dutchman01 via freebsd-ports < freebsd-ports@freebsd.org> wrote: > Hi, new maintenance release is out, > > this port could use an upstream release. > > > > Can you please upgrade the port? > > > > Ty , regards, > > dutchy > > _______________________________________________ > freebsd-ports@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADy1Ce5s79X-YUPKW3RH4gtyJHc212FiHZdiob1vgdS7_nvuuw>