From owner-freebsd-questions@FreeBSD.ORG Mon Feb 16 22:48:05 2015 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 998C138A for ; Mon, 16 Feb 2015 22:48:05 +0000 (UTC) Received: from avasout07.plus.net (avasout07.plus.net [84.93.230.235]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client CN "Bizanga Labs SMTP Client Certificate", Issuer "Bizanga Labs CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 2D316DB6 for ; Mon, 16 Feb 2015 22:48:04 +0000 (UTC) Received: from curlew.milibyte.co.uk ([84.92.153.232]) by avasout07 with smtp id tAnu1p003516WCc01Anv9L; Mon, 16 Feb 2015 22:47:56 +0000 X-CM-Score: 0.00 X-CNFS-Analysis: v=2.1 cv=TqhohVnh c=1 sm=1 tr=0 a=lfSX4pPLp9EkufIcToJk/A==:117 a=lfSX4pPLp9EkufIcToJk/A==:17 a=D7rCoLxHAAAA:8 a=0Bzu9jTXAAAA:8 a=kj9zAlcOel0A:10 a=0HtSIViG9nkA:10 a=SuFOw32sAAAA:8 a=6I5d2MoRAAAA:8 a=yMSE5CulKhmH4ELKRpAA:9 a=CjuIK1q_8ugA:10 Received: from curlew.lan ([192.168.1.13]) by curlew.milibyte.co.uk with esmtp (Exim 4.85) (envelope-from ) id 1YNUSH-0002eU-Mj; Mon, 16 Feb 2015 22:47:54 +0000 Date: Mon, 16 Feb 2015 22:47:53 +0000 From: Mike Clarke To: John Goerzen Message-ID: <20150216224753.73143297@curlew.lan> In-Reply-To: References: X-Mailer: Claws Mail 3.11.1 (GTK+ 2.24.25; amd64-portbld-freebsd10.0) MIME-Version: 1.0 X-SA-Exim-Connect-IP: 192.168.1.13 X-SA-Exim-Mail-From: jmc-freebsd2@milibyte.co.uk X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on curlew.lan X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.0 Subject: Re: pkg audit finds updates, but pkg upgrade doesn't Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-SA-Exim-Version: 4.2 X-SA-Exim-Scanned: Yes (on curlew.milibyte.co.uk) Cc: freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Feb 2015 22:48:05 -0000 On Mon, 16 Feb 2015 22:12:01 +0000 (UTC) John Goerzen wrote: > Hmm. I can repeat these commands as often as I like, and still I get the > same thing: xorg-server is vulnerable, but my packages are up-to-date. That > issue has been in FreeBSD's vulnerability database for almost a week, so > presumably I'm not just seeing mirror lag or something here. xorg-server was modified on Thursday Feb 12th at 19:58:41 to fix this vulnerability . The latest package builds started on Wednesday 11th and . It looks like they all used snapshots from before the new version was available except for 84i386-default and 84amd64-default. The next package build should start in a couple of days time on Wednesday 18th. -- Mike Clarke