From owner-freebsd-ports@freebsd.org Sat Dec 15 15:00:29 2018 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 90492132213A for ; Sat, 15 Dec 2018 15:00:29 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 20378741B3 for ; Sat, 15 Dec 2018 15:00:29 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id D7B2E1322139; Sat, 15 Dec 2018 15:00:28 +0000 (UTC) Delivered-To: ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C5FD71322137 for ; Sat, 15 Dec 2018 15:00:28 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from tensor.andric.com (tensor.andric.com [87.251.56.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "tensor.andric.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4390C741B2 for ; Sat, 15 Dec 2018 15:00:28 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from [IPv6:2001:470:7a58::31a4:d0c3:79bf:7a60] (unknown [IPv6:2001:470:7a58:0:31a4:d0c3:79bf:7a60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id 3927D4AF8; Sat, 15 Dec 2018 16:00:20 +0100 (CET) From: Dimitry Andric Message-Id: <6461B984-4C62-4055-A7BB-592A65D44D29@FreeBSD.org> Content-Type: multipart/signed; boundary="Apple-Mail=_B4C1EFFE-3EFB-4FE2-BC44-C3D02D7F01AB"; protocol="application/pgp-signature"; micalg=pgp-sha1 Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: vulnerabilities bogus error Date: Sat, 15 Dec 2018 16:00:10 +0100 In-Reply-To: <5C14233F.3020106@gmail.com> Cc: "ports@FreeBSD.org" To: Ernie Luzar References: <5C14233F.3020106@gmail.com> X-Mailer: Apple Mail (2.3445.9.1) X-Rspamd-Queue-Id: 4390C741B2 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-7.00 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-1.00)[-0.999,0] X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 15 Dec 2018 15:00:29 -0000 --Apple-Mail=_B4C1EFFE-3EFB-4FE2-BC44-C3D02D7F01AB Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii On 14 Dec 2018, at 22:40, Ernie Luzar wrote: >=20 > Trying to update my port. During make install get a bunch of bogus = error messages about the port having vulnerabilities. I know this to not = be the case. The first message says > pkg-static; unable to open vulnxml file (null): Invalid argument >=20 > This is a new fresh install of RELEASE 12.0. How do I manually fetch = this vulnxml file or where should I "touch" to create it? Run "pkg audit -F". -Dimitry --Apple-Mail=_B4C1EFFE-3EFB-4FE2-BC44-C3D02D7F01AB Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.2 iF0EARECAB0WIQR6tGLSzjX8bUI5T82wXqMKLiCWowUCXBUXAAAKCRCwXqMKLiCW o9o7AKDakSxY4o0vXBtOGchXhxOrDD/ukwCfT8XHLhKWOiW0pK90EOlLVklN8n0= =uvxQ -----END PGP SIGNATURE----- --Apple-Mail=_B4C1EFFE-3EFB-4FE2-BC44-C3D02D7F01AB--