From owner-freebsd-ports@freebsd.org Fri May 5 17:51:45 2017 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1F28FD5F5ED for ; Fri, 5 May 2017 17:51:45 +0000 (UTC) (envelope-from adamw@adamw.org) Received: from apnoea.adamw.org (apnoea.adamw.org [104.225.5.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "apnoea.adamw.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 5B0F4A5D for ; Fri, 5 May 2017 17:51:42 +0000 (UTC) (envelope-from adamw@adamw.org) Received: by apnoea.adamw.org (OpenSMTPD) with ESMTPSA id 2f05f50b TLS version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO; Fri, 5 May 2017 11:51:40 -0600 (MDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\)) Subject: Re: ICU Portupdate faulty From: Adam Weinberger In-Reply-To: <20170505171304.GV17905@over-yonder.net> Date: Fri, 5 May 2017 11:51:38 -0600 Cc: Jos Chrispijn , freebsd-ports@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <1c87d7b6-54f7-77f0-7476-338bd24aee54@cloudzeeland.nl> <8d3c7d80-d51e-3743-eb41-d6633c498153@cloudzeeland.nl> <06F34A01-9844-48E2-8ED4-FA148BC426C8@adamw.org> <20170505171304.GV17905@over-yonder.net> To: "Matthew D. Fuller" X-Mailer: Apple Mail (2.3273) X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 May 2017 17:51:45 -0000 > On 5 May, 2017, at 11:13, Matthew D. Fuller = wrote: >=20 > On Fri, May 05, 2017 at 10:05:05AM -0600 I heard the voice of > Adam Weinberger, and lo! it spake thus: >>=20 >> Yes, this is the correct answer. After icu got patched, the VuXML >> entry was lowered to mark 58.2_2,1 as non-vulnerable. Jos, it sounds >> like your ports tree is after the icu update but before the VuXML >> modification. Update your ports tree to bring in the new VuXML file >> and you should be good. >=20 > No, it's not looking at the vuxml file right in ports. It'll be using > the audit file downloaded nightly as part of > /usr/local/etc/periodic/security/410.pkg-audit, so it'll always be ~a > day out of date. Run `pkg audit -F` manually to kick a refetch of the > latest. Ah! You and Kevin are completely right. Thank you for giving Jos the = right answer. # Adam --=20 Adam Weinberger adamw@adamw.org https://www.adamw.org