Hello.
I just made the last update of the ports yesterday (I use portmaster -da
performing this
task) and obviously or superficially everything went all right.
I'm running on the boxes in question most recent CURRENT.
On one system, a subsequent start of updating ports starts to freak out
On Tue, 30 Sep 2014 08:13+0200, O. Hartmann wrote:
Hello.
I just made the last update of the ports yesterday (I use portmaster -da
performing this
task) and obviously or superficially everything went all right.
I'm running on the boxes in question most recent CURRENT.
On one
On Tue, 30 Sep 2014 08:40+0200, Trond Endrestøl wrote:
On Tue, 30 Sep 2014 08:13+0200, O. Hartmann wrote:
Hello.
I just made the last update of the ports yesterday (I use portmaster -da
performing this
task) and obviously or superficially everything went all right.
I'm
Am Tue, 30 Sep 2014 08:40:19 +0200 (CEST)
Trond Endrestøl trond.endres...@fagskolen.gjovik.no schrieb:
On Tue, 30 Sep 2014 08:13+0200, O. Hartmann wrote:
Hello.
I just made the last update of the ports yesterday (I use portmaster -da
performing
this task) and obviously or
Trying to update www/seamonkey, I failed on an error in databases/py-sqlite3
relating to _ctypes, am not really familiar with that.
I am on FreeBSD-current amd64, updated from source yesterday.
I tried to portmaster databases/py-sqlite3 separately after initial failure, to
isolate the error.
Dear port maintainer,
The portscout new distfile checker has detected that one or more of your
ports appears to be out of date. Please take the opportunity to check
each of the ports listed below, and if possible and appropriate,
submit/commit an update. If any ports have already been updated,
Am 30.09.2014 um 08:13 schrieb O. Hartmann:
Hello.
I just made the last update of the ports yesterday (I use portmaster -da
performing this
task) and obviously or superficially everything went all right.
I'm running on the boxes in question most recent CURRENT.
On one system, a
On Mon, Sep 29, 2014 at 1:37 PM, Dave Babb dcbd...@comcast.net wrote:
One more issue I forgot to mention...On the website, under portsthe
website is also reporting the wrong package name..
The package name is not wrong, as the py-gobject port can be built
against different versions of
INDEX build failed with errors:
Generating INDEX-8 - please wait..--- describe.accessibility ---
--- describe.arabic ---
--- describe.archivers ---
--- describe.arabic ---
make[5]: /home/indexbuild/tindex/ports/Mk/bsd.port.mk line 1209: UNAME_r
(10.1-PRERELEASE) and OSVERSION (804505) do not
On 2014-09-29 12:13:15 -0400, Bryan Drewery wrote:
On 9/29/2014 11:01 AM, Mike Tancsa wrote:
On 9/26/2014 5:01 PM, Bryan Drewery wrote:
On 9/26/2014 12:41 PM, Bryan Drewery wrote:
On 9/26/2014 11:51 AM, Bryan Drewery wrote:
On 9/26/2014 11:46 AM, Bartek Rutkowski wrote:
Apparently, the full
echo Testing Exploit 1 (CVE-2014-6271)
CVE6271=$(env x='() { :;}; echo -n V' bash -c : 2/dev/null)
[ ${CVE7187} == V ] echo VULNERABLE || echo NOT VULNERABLE
echo Testing Exploit 2 (CVE-2014-7169)
CVE7169=$(env X='() { (4lpi.com)=\' bash -c echo date 2/dev/null; cat echo
2/dev/null; rm -f echo)
I'm having a tough time trying to build the latest databases/mongodb
(2.6.4) using Poudriere. The host and target is FreeBSD 10 amd64. Here's
the resulting log where it fails. Has anyone else experienced this?
c++ -o
On 9/30/2014 1:54 PM, Jung-uk Kim wrote:
On 2014-09-29 12:13:15 -0400, Bryan Drewery wrote:
On 9/29/2014 11:01 AM, Mike Tancsa wrote:
On 9/26/2014 5:01 PM, Bryan Drewery wrote:
On 9/26/2014 12:41 PM, Bryan Drewery wrote:
On 9/26/2014 11:51 AM, Bryan Drewery wrote:
On 9/26/2014 11:46 AM,
On 2014-09-30 14:58:07 -0400, Jason Hellenthal wrote:
echo Testing Exploit 1 (CVE-2014-6271)
CVE6271=$(env x='() { :;}; echo -n V' bash -c : 2/dev/null)
[ ${CVE7187} == V ] echo VULNERABLE || echo NOT VULNERABLE
echo Testing Exploit 2 (CVE-2014-7169)
CVE7169=$(env X='() { (4lpi.com)=\'
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org
On Sep 30, 2014, at 12:46 PM, Bryan Drewery bdrew...@freebsd.org wrote:
[ ... ]
I even saw a reddit post last night complaining that OSX had updated
bash only to leave it still vulnerable because of the redir_stack issue.
It doesn't seem to be?
bash-3.2$ bash --version
GNU bash, version
I would agree with that. Considering the korn shell was found out to be
importing functions from bash this morning that it does not completely know how
to interpret goes to say that there is a much bigger issue at face here than
the mere sys admins can begin to fathom quite yet.
There is still
On 9/30/2014 5:25 PM, Charles Swiger wrote:
bash-3.2$ echo Testing Exploit 4 (CVE-2014-7186)
Testing Exploit 4 (CVE-2014-7186)
bash-3.2$ CVE7186=$(bash -c 'true EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF
EOF EOF EOF' 2/dev/null ||echo -n V)
bash-3.2$ [ ${CVE7186} == V ] echo VULNERABLE ||
On 2014-09-30 18:00:31 -0400, Mike Tancsa wrote:
On 9/30/2014 5:25 PM, Charles Swiger wrote:
bash-3.2$ echo Testing Exploit 4 (CVE-2014-7186)
Testing Exploit 4 (CVE-2014-7186)
bash-3.2$ CVE7186=$(bash -c 'true EOF EOF EOF EOF EOF EOF
EOF EOF EOF EOF EOF EOF EOF EOF' 2/dev/null ||echo -n
V)
On Sep 30, 2014, at 3:08 PM, Jung-uk Kim j...@freebsd.org wrote:
On 2014-09-30 18:00:31 -0400, Mike Tancsa wrote:
On 9/30/2014 5:25 PM, Charles Swiger wrote:
bash-3.2$ echo Testing Exploit 4 (CVE-2014-7186)
Testing Exploit 4 (CVE-2014-7186)
bash-3.2$ CVE7186=$(bash -c 'true EOF EOF EOF EOF
On 9/30/2014 1:54 PM, Jung-uk Kim wrote:
On 2014-09-29 12:13:15 -0400, Bryan Drewery wrote:
On 9/29/2014 11:01 AM, Mike Tancsa wrote:
On 9/26/2014 5:01 PM, Bryan Drewery wrote:
On 9/26/2014 12:41 PM, Bryan Drewery wrote:
On 9/26/2014 11:51 AM, Bryan Drewery wrote:
On 9/26/2014 11:46 AM,
21 matches
Mail list logo