From nobody Sun Mar 20 12:24:24 2022 X-Original-To: ports@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id C3C6E1A145F0 for ; Sun, 20 Mar 2022 12:24:27 +0000 (UTC) (envelope-from roberthuff@rcn.com) Received: from smtp.rcn.com (mail.rcn.syn-alias.com [129.213.13.252]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4KLxky6JShz4YDs for ; Sun, 20 Mar 2022 12:24:26 +0000 (UTC) (envelope-from roberthuff@rcn.com) DKIM-Signature: v=1; a=rsa-sha1; d=rcn.com; s=20180516; c=relaxed/simple; q=dns/txt; i=@rcn.com; t=1647779065; h=From:Subject:Date:To:MIME-Version:Content-Type; bh=fh3du33na5hVsqa8YjOGuvE8QXE=; b=Tr3R6Kgyx95v8oxtJyb81FknQ0F3KJ7gN7YgPJGDYTsMOHgabDbj2pDTiFEHcF3+ wUyHdTi3gLfRTvq+NrWsYkHLAOoE1sYREIs1sGTJVtO473S5qH7LVKmosJcJIhfa 7j4LN/138GkucyN8Rw1vGLx+7chk/iHZDr+8SBhP8ByGMya9BRAZpqWCySya21/h tAdjr4EJh+/SApmfO2PmVTCScqSF5rzCQO27LcMBvHvBi9pers0xm0cYynehYN54 mYVNVN8VagAn+YML2FATrYDrR6v40zPlT+Qpei10RVOO/e+6NSa2BpjsHldoLT87 moA/0ZeBmr8k9iyj+88q1w==; X-Authed-Username: cm9iZXJ0aHVmZkByY24uY29t Received: from [130.44.129.206] ([130.44.129.206:65165] helo=jerusalem.litteratus.org.litteratus.org) by smtp.rcn.com (envelope-from ) (ecelerity 4.3.1.69410 r(Core:4.3.1.0)) with ESMTPSA (cipher=AES256-GCM-SHA384) id D8/2A-23987-9FC17326; Sun, 20 Mar 2022 08:24:25 -0400 List-Id: Porting software to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-ports List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports@freebsd.org X-BeenThere: freebsd-ports@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <25143.7416.265964.812896@jerusalem.litteratus.org> Date: Sun, 20 Mar 2022 08:24:24 -0400 From: Robert Huff To: ports@freebsd.org Subject: missing vulnxml file X-Mailer: VM 8.2.0b under 27.2 (amd64-portbld-freebsd14.0) X-Vade-Verdict: clean X-Vade-Analysis-1: gggruggvucftvghtrhhoucdtuddrgedvvddrudeguddgfeelucetufdoteggodetrfdotffvucfrrhho X-Vade-Analysis-2: fhhilhgvmecuufgjpfetvefqtfdptfevpfdpgffpggdqtfevpfdpqfgfvfenuceurghilhhouhhtmecu X-Vade-Analysis-3: fedtudenucenucfjughrpeggtgfgkfffhffvuffosehtjeertdertddvnecuhfhrohhmpeftohgsvghr X-Vade-Analysis-4: thcujfhufhhfuceorhhosggvrhhthhhufhhfsehrtghnrdgtohhmqeenucggtffrrghtthgvrhhnpedu X-Vade-Analysis-5: fedugeetieeludefhfeitdffteekgeejhfekueekgeevffekledvjedvleegfeenucfkphepudeftddr X-Vade-Analysis-6: geegrdduvdelrddvtdeinecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehinhgvthepudef X-Vade-Analysis-7: tddrgeegrdduvdelrddvtdeipdhhvghlohepjhgvrhhushgrlhgvmhdrlhhithhtvghrrghtuhhsrdho X-Vade-Analysis-8: rhhgrdhlihhtthgvrhgrthhushdrohhrghdpmhgrihhlfhhrohhmpehrohgsvghrthhhuhhffhesrhgt X-Vade-Analysis-9: nhdrtghomhdprhgtphhtthhopehpohhrthhssehfrhgvvggsshgurdhorhhgpdhmthgrhhhoshhtpehs X-Vade-Analysis-10: mhhtphdrrhgtnhdrvghmrghilhdqrghshhdurdhshihntgdrlhgrnhdpnhgspghrtghpthhtohepuddp X-Vade-Analysis-11: rghuthhhpghushgvrheprhhosggvrhhthhhufhhf X-Vade-Client: RCN X-Rspamd-Queue-Id: 4KLxky6JShz4YDs X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=rcn.com header.s=20180516 header.b=Tr3R6Kgy; dmarc=pass (policy=none) header.from=rcn.com; spf=pass (mx1.freebsd.org: domain of roberthuff@rcn.com designates 129.213.13.252 as permitted sender) smtp.mailfrom=roberthuff@rcn.com X-Spamd-Result: default: False [-4.00 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[rcn.com:s=20180516]; NEURAL_HAM_MEDIUM(-1.00)[-0.999]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:129.213.13.252/32]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; RCPT_COUNT_ONE(0.00)[1]; DKIM_TRACE(0.00)[rcn.com:+]; DMARC_POLICY_ALLOW(-0.50)[rcn.com,none]; RCVD_IN_DNSWL_NONE(0.00)[129.213.13.252:from]; NEURAL_HAM_SHORT(-1.00)[-1.000]; MLMMJ_DEST(0.00)[ports]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:31898, ipnet:129.213.8.0/21, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[rcn.com:dkim] X-ThisMailContainsUnwantedMimeParts: N When I updated ports yesterday, everything worked fine. Today ... I get: ===> Cleaning for libgnomecanvas-2.30.3_5 pkg-static: unable to open vulnxml file (null): Invalid argument ===> libgnomecanvas-2.30.3_5 has known vulnerabilities: => Please update your ports tree and try again. => Note: Vulnerable ports are marked as such even if there is no update available. => If you wish to ignore this vulnerability rebuild with 'make DISABLE_VULNERABILITIES=yes' Where should I look for the file? And if it's missing - where is the correct place to get a replacement? Respectfully, Robert Huff