From owner-freebsd-ports@freebsd.org Fri May 5 17:19:46 2017 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E73BAD5FAF0 for ; Fri, 5 May 2017 17:19:46 +0000 (UTC) (envelope-from kob6558@gmail.com) Received: from mail-pf0-x234.google.com (mail-pf0-x234.google.com [IPv6:2607:f8b0:400e:c00::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B616AB6F for ; Fri, 5 May 2017 17:19:46 +0000 (UTC) (envelope-from kob6558@gmail.com) Received: by mail-pf0-x234.google.com with SMTP id q66so5514362pfi.3 for ; Fri, 05 May 2017 10:19:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=KwRSYq7cRhCx1YI1Q4ENv6oA8fZ5zJ59xSQt04soA5Y=; b=Qc5xI3kuNGJiEA5Hmsu7EtDKkcqeQBz6ywLQim3ur9Ro6NDdmkML8kjOPqP2BB9cou kUKPCcjqQps78UxagASimy2R7F+SZvNe/+KM8O1QPDGJ7kSMVqfICADcVIIN3WbpQd04 c9fcuuEYtBp9F23gV70/n/+oUhQhzETWKxrrAFeuHIUh4FRSccuzwREoRPRPiOR5iPI5 Zxt5W3V9wxm9zY6rodfBwzny+O2O75n3kCbYZnY+wNNmKkQjv/Eq+G4kRm9zg07MgCj2 GoRPdmTFkp5cv5WQ79A1CFjvtnn6Wd5pYAMD265uQShexy/G4Ul6gvEosNtUBNFANE3s WEzw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=KwRSYq7cRhCx1YI1Q4ENv6oA8fZ5zJ59xSQt04soA5Y=; b=T3isMMUnydhMiBkv2TFkDUgkLsECTp33CCe/EGgmjJ/YFNBiHDss0qyg8kMK0qEeng Tgxk9oXTYMe485dlRpIvepN85tWq0WYjgQSOAI/wmrM8hVXztgch5y0/Btc0K6lx4xri /fiw7JNp9CsZfdDb5HxLUkGYQoR5t22ylhjNU1A+tsfd5HUGAlPvMrERiHX0AVVWo2gv Oc3l7OlA4OrZojVXbhBC6RNYPFJetCluoHiHqf470fdrOYn7ldkjWRNUraiWoPhUOngT D4AFzVuRcJOUJk9hUqvTYzzpbQgHwGnuLDokLPp9bIQDpYUxbzCQakh6c2jtbHcXzk+g ebMw== X-Gm-Message-State: AN3rC/5wfN/lmWnoyVPt5DHGBR7A3RAdAqWhSa97gn7Hyka/ekSXb4QE pghVL396/grNvn/05Va/ndOFzkPsbE1ojj4= X-Received: by 10.98.215.26 with SMTP id b26mr18363420pfh.162.1494004786332; Fri, 05 May 2017 10:19:46 -0700 (PDT) MIME-Version: 1.0 Sender: kob6558@gmail.com Received: by 10.100.138.15 with HTTP; Fri, 5 May 2017 10:19:45 -0700 (PDT) In-Reply-To: <360f4dc3-c97a-592d-c321-5ce591c89193@cloudzeeland.nl> References: <1c87d7b6-54f7-77f0-7476-338bd24aee54@cloudzeeland.nl> <8d3c7d80-d51e-3743-eb41-d6633c498153@cloudzeeland.nl> <06F34A01-9844-48E2-8ED4-FA148BC426C8@adamw.org> <360f4dc3-c97a-592d-c321-5ce591c89193@cloudzeeland.nl> From: Kevin Oberman Date: Fri, 5 May 2017 07:19:45 -1000 X-Google-Sender-Auth: OsSSqWFGThrkTCHOqMjSqm5oOlU Message-ID: Subject: Re: ICU Portupdate faulty To: Jos Chrispijn Cc: Adam Weinberger , mokhi , FreeBSD Ports ML Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 May 2017 17:19:47 -0000 On Fri, May 5, 2017 at 6:37 AM, Jos Chrispijn wrote: > > Op 5-5-2017 om 18:05 schreef Adam Weinberger: > >> On 5 May, 2017, at 9:48, mokhi wrote: >>> >>> Well, as I can see here < http://www.freshports.org/devel/icu/ > an >>> older version of this port is vulnerable not current version. >>> Maybe by updating your tree your problem will be solved :-] >>> >> Yes, this is the correct answer. After icu got patched, the VuXML entry >> was lowered to mark 58.2_2,1 as non-vulnerable. Jos, it sounds like your >> ports tree is after the icu update but before the VuXML modification. >> Update your ports tree to bring in the new VuXML file and you should be >> good. >> > Adam, perhaps I am missing the clue here: > > - I had the correct updated version in my ports collection > - Updating the vulnerable installed icu version with that version should > not provide the Vulnerability message as that version is updates with the > correct version in my icu port. > > In my case, Jim's suggestion to use "DISABLE_VULNERABILITIES=yes" was the > only way of getting my faulty icu version updated to the version that is in > my port. > > Kind of confused, > Jos The VuXML DB is not a part of the ports tree. It is usually updated by the nightly periodic script, but you can manually fetch it with "pkg audit -F -q". -- Kevin Oberman, Part time kid herder and retired Network Engineer E-mail: rkoberman@gmail.com PGP Fingerprint: D03FB98AFA78E3B78C1694B318AB39EF1B055683