From nobody Mon Mar 23 00:05:53 2026 X-Original-To: pkg@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4ffD3562nlz6WGyP for ; Mon, 23 Mar 2026 00:05:53 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R12" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4ffD354L4tz3htb for ; Mon, 23 Mar 2026 00:05:53 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1774224353; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=fMQX3ov8Ynbirgk244C2jzIGBJW7zi1oTn9RJLkv684=; b=UaT6OxQQCGc32vOQSRIna7EFKeeuK98A3MclcrvXvVx5rgOdD7pecRSTpVCn21YsUeAiy2 6P3EhEAWti8gmMUKYAE8sxrzISXLIxw3sL6QgevGWMnDFxRaN6H5uhqeNQtQdvj9OcSMfg rsJlNzgZEePWaczSx9EIsPhPl4nQ+WBuGb3RMoaUEeDO+dkh/Kq42tsbntugGxstEh+BeN OMgrF5CikTQliWydELD+DhlpxT4YU4BdtJK1n55yRUo1CqTLQF0hOrHrrtJj8FTIYaj9aN 0uZDBFiLCcRbuDnAe3USItswftPsBv/+tVZtMlHLhI8LeAs5E2Iw9Qu8SFM57w== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1774224353; a=rsa-sha256; cv=none; b=GKmlSw1jBVcXXx2UVeGgIHFSE2Rbn0bxuhyI36B2AbFDALu2gyhaGuskrOzRJbdmz5/kr4 wRdMopzduT/M91SXTyA16/dmhhvIFSptVzqs2atdm7e1HzUcZ2zALxg/pJ0/WBVprH5sbf jZ7hxbDeipmU0sdjM9nKyV4Hgd3A4yG1cDytFnp8EsgNKQHzyOnecE5PR/Fo7AjzIVtjxu eTX7qh+WkhRz6rE2+5EH4HRVzspxcm53M2bFsslyxEweYByJzf9WGv24t6EiE5jYBqPbTf wkvhXvQSUU/6a7s+8Fj8v3ceq0weplU/IkOnzRKl1pst4EK7OJktDzuqQyYbuA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1774224353; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=fMQX3ov8Ynbirgk244C2jzIGBJW7zi1oTn9RJLkv684=; b=fJNtb01zBpTuhsAwcu5W7Cm1VIP5ulLpPQUrpdNM5ftH1UYqKXQ5slskJxbrFtXSrf4CY/ qmv9yplgtZsR/tX2Jc8hhUaZV14i4rLs6ZEtE+RnuO2H/Xz36HeKVq2hCi26+20n5hYh4m 9iWD5wloJfMNVHZZfMFJu4EehEdz8lC0yt7HYO4tZiQpY7qMguIFZN86VJOV+kLscSV8Xn 2ozbjdizjNkhf2BxenGTd/FOR1g15fZTEDUAchnuOzcUhxVCAS+ALoMoOBfpzapfqKMeEw bs43UFoDlssBOqcq/M/NVBVlI6uWYikj2KlM4UZL4HVlnSCTmHoaC6zWzZHYpw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4ffD353wtSz7Lw for ; Mon, 23 Mar 2026 00:05:53 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 62N05rYh096726 for ; Mon, 23 Mar 2026 00:05:53 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 62N05ruI096725 for pkg@FreeBSD.org; Mon, 23 Mar 2026 00:05:53 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: pkg@FreeBSD.org Subject: [Bug 262966] ports-mgmt/pkg: pkg can't recover from a corrupt vulnerability database. Date: Mon, 23 Mar 2026 00:05:53 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: tz@freebsd.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: Feedback Timeout X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: pkg@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Binary package management and package tools discussion List-Archive: https://lists.freebsd.org/archives/freebsd-pkg List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-pkg@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D262966 --- Comment #1 from Torsten Zuehlsdorff --- I am closing this enhancement request as obsolete. The suggestion to have p= kg auto-detect and re-fetch a corrupt vuln.xml was filed against an older pkg version in March 2022. The port is now at version 2.6.2, with many updates since then that may have addressed integrity handling. No patch was provide= d, and there has been no community interest in 4 years. --=20 You are receiving this mail because: You are the assignee for the bug.=