Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 5 May 2017 12:13:05 -0500
From:      "Matthew D. Fuller" <fullermd@over-yonder.net>
To:        Adam Weinberger <adamw@adamw.org>
Cc:        Jos Chrispijn <bsdports@cloudzeeland.nl>, freebsd-ports@freebsd.org
Subject:   Re: ICU Portupdate faulty
Message-ID:  <20170505171304.GV17905@over-yonder.net>
In-Reply-To: <06F34A01-9844-48E2-8ED4-FA148BC426C8@adamw.org>
References:  <1c87d7b6-54f7-77f0-7476-338bd24aee54@cloudzeeland.nl> <CAByVWPVRp4PnW0Fm26aL_TW4R9BUtOQvn9XEEaQtJFqHMz3xaA@mail.gmail.com> <8d3c7d80-d51e-3743-eb41-d6633c498153@cloudzeeland.nl> <CAByVWPUeeCDcNo8d8OW3EJo2S5VzENukkvAYrYzObjnix6vggA@mail.gmail.com> <06F34A01-9844-48E2-8ED4-FA148BC426C8@adamw.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, May 05, 2017 at 10:05:05AM -0600 I heard the voice of
Adam Weinberger, and lo! it spake thus:
> 
> Yes, this is the correct answer. After icu got patched, the VuXML
> entry was lowered to mark 58.2_2,1 as non-vulnerable. Jos, it sounds
> like your ports tree is after the icu update but before the VuXML
> modification. Update your ports tree to bring in the new VuXML file
> and you should be good.

No, it's not looking at the vuxml file right in ports.  It'll be using
the audit file downloaded nightly as part of
/usr/local/etc/periodic/security/410.pkg-audit, so it'll always be ~a
day out of date.  Run `pkg audit -F` manually to kick a refetch of the
latest.


-- 
Matthew Fuller     (MF4839)   |  fullermd@over-yonder.net
Systems/Network Administrator |  http://www.over-yonder.net/~fullermd/
           On the Internet, nobody can hear you scream.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20170505171304.GV17905>