Changes to the LIVEcommunity experience are coming soon... Here's what you need to know.
After reading PAN-SA-2019-00015– Cross Site Scripting (XSS) in MineMeld, I need to upgrade to version 0.9.62 but this is what I get:
ubuntu@sfovp-minemeld:~$ sudo /usr/sbin/minemeld-auto-update
2019-06-28 16:45:57,709 INFO:0.9.11 Current status:
2019-06-28 16:45:57,710 INFO:0.9.11 minemeld-engine: current: 0.9.52.post1 latest: 0.9.52.post1
2019-06-28 16:45:57,710 INFO:0.9.11 minemeld-webui: current: 0.9.52 latest: 0.9.52
2019-06-28 16:45:57,710 INFO:0.9.11 minemeld-prototypes: current: 0.9.52.post1 latest: 0.9.52.post1
2019-06-28 16:45:57,989 DEBUG:0.9.11 curl output:
2019-06-28 16:45:58,011 DEBUG:0.9.11 curl output:
2019-06-28 16:45:58,012 DEBUG:0.9.11 gpgv: /usr/bin/gpgv --ignore-time-conflict --keyring /etc/apt/trusted.gpg --keyring /etc/apt/trusted.gpg.d/minemeld.gpg
2019-06-28 16:45:58,029 INFO:0.9.11 gpgv output: gpgv: Signature made Tue 15 Jan 2019 07:52:41 AM UTC using RSA key ID
gpgv: Good signature from "Palo Alto Networks, MineMeld Team <minemeld@paloaltonetworks.com>"
gpgv: aka "[invalid image]"
2019-06-28 16:45:58,037 INFO:0.9.11 No package to deploy, exit
ubuntu@sfovp-minemeld:~$
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!