***GOT REQUEST TO AUDIT SECURITY***vulnxml file up-to-dateclamav-0.102.2,1 is vulnerable:clamav -- multiple vulnerabilitiesCVE: CVE-2020-3341CVE: CVE-2020-3327WWW: https://vuxml.FreeBSD.org/freebsd/91ce95d5-cd15-4105-b942-af5ccc7144c1.htmllibnghttp2-1.40.0 is vulnerable:nghttp2 -- DoS vulnerabilityCVE: CVE-2020-11080WWW: https://vuxml.FreeBSD.org/freebsd/4bb56d2f-a5b0-11ea-a860-08002728f74c.htmlunbound-1.10.0 is vulnerable:unbound -- mutliple vulnerabilitiesCVE: CVE-2020-12663CVE: CVE-2020-12662WWW: https://vuxml.FreeBSD.org/freebsd/a2cb7c31-9c79-11ea-a9c2-d05099c0ae8c.htmljson-c-0.13.1_1 is vulnerable:json-c -- integer overflow and out-of-bounds write via a large JSON fileCVE: CVE-2020-12762WWW: https://vuxml.FreeBSD.org/freebsd/abc3ef37-95d4-11ea-9004-25fadb81abf4.htmlgnutls-3.6.13_1 is vulnerable:GnuTLS -- flaw in TLS session ticket key constructionCVE: CVE-2020-13777WWW: https://vuxml.FreeBSD.org/freebsd/ef5b4f5f-a658-11ea-80d7-001cc0382b2f.html
Due to an upgrade issue we haven't been able to narrow down we will not release 20.1.8, so there will be no tag for it.https://twitter.com/opnsense/status/1276124128509153287We appreciate the concern and nudging, but asking for something that isn't ready will not help. What helps is inspecting process that the project has established many years ago and going from there.2020 is an interesting year for all of us and I am personally sorry for any inconvenience caused.