Date: Fri, 5 May 2017 12:13:05 -0500 From: "Matthew D. Fuller" <fullermd@over-yonder.net> To: Adam Weinberger <adamw@adamw.org> Cc: Jos Chrispijn <bsdports@cloudzeeland.nl>, freebsd-ports@freebsd.org Subject: Re: ICU Portupdate faulty Message-ID: <20170505171304.GV17905@over-yonder.net> In-Reply-To: <06F34A01-9844-48E2-8ED4-FA148BC426C8@adamw.org> References: <1c87d7b6-54f7-77f0-7476-338bd24aee54@cloudzeeland.nl> <CAByVWPVRp4PnW0Fm26aL_TW4R9BUtOQvn9XEEaQtJFqHMz3xaA@mail.gmail.com> <8d3c7d80-d51e-3743-eb41-d6633c498153@cloudzeeland.nl> <CAByVWPUeeCDcNo8d8OW3EJo2S5VzENukkvAYrYzObjnix6vggA@mail.gmail.com> <06F34A01-9844-48E2-8ED4-FA148BC426C8@adamw.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, May 05, 2017 at 10:05:05AM -0600 I heard the voice of Adam Weinberger, and lo! it spake thus: > > Yes, this is the correct answer. After icu got patched, the VuXML > entry was lowered to mark 58.2_2,1 as non-vulnerable. Jos, it sounds > like your ports tree is after the icu update but before the VuXML > modification. Update your ports tree to bring in the new VuXML file > and you should be good. No, it's not looking at the vuxml file right in ports. It'll be using the audit file downloaded nightly as part of /usr/local/etc/periodic/security/410.pkg-audit, so it'll always be ~a day out of date. Run `pkg audit -F` manually to kick a refetch of the latest. -- Matthew Fuller (MF4839) | fullermd@over-yonder.net Systems/Network Administrator | http://www.over-yonder.net/~fullermd/ On the Internet, nobody can hear you scream.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20170505171304.GV17905>