pkg/ports system terribly messed up?

2014-09-30 Thread O. Hartmann
Hello. I just made the last update of the ports yesterday (I use portmaster -da performing this task) and obviously or superficially everything went all right. I'm running on the boxes in question most recent CURRENT. On one system, a subsequent start of updating ports starts to freak out

Re: pkg/ports system terribly messed up?

2014-09-30 Thread Trond Endrestøl
On Tue, 30 Sep 2014 08:13+0200, O. Hartmann wrote: Hello. I just made the last update of the ports yesterday (I use portmaster -da performing this task) and obviously or superficially everything went all right. I'm running on the boxes in question most recent CURRENT. On one

Re: pkg/ports system terribly messed up?

2014-09-30 Thread Trond Endrestøl
On Tue, 30 Sep 2014 08:40+0200, Trond Endrestøl wrote: On Tue, 30 Sep 2014 08:13+0200, O. Hartmann wrote: Hello. I just made the last update of the ports yesterday (I use portmaster -da performing this task) and obviously or superficially everything went all right. I'm

Re: pkg/ports system terribly messed up?

2014-09-30 Thread O. Hartmann
Am Tue, 30 Sep 2014 08:40:19 +0200 (CEST) Trond Endrestøl trond.endres...@fagskolen.gjovik.no schrieb: On Tue, 30 Sep 2014 08:13+0200, O. Hartmann wrote: Hello. I just made the last update of the ports yesterday (I use portmaster -da performing this task) and obviously or

py-sqlite3 fails on missing _ctypes

2014-09-30 Thread Thomas Mueller
Trying to update www/seamonkey, I failed on an error in databases/py-sqlite3 relating to _ctypes, am not really familiar with that. I am on FreeBSD-current amd64, updated from source yesterday. I tried to portmaster databases/py-sqlite3 separately after initial failure, to isolate the error.

FreeBSD ports you maintain which are out of date

2014-09-30 Thread portscout
Dear port maintainer, The portscout new distfile checker has detected that one or more of your ports appears to be out of date. Please take the opportunity to check each of the ports listed below, and if possible and appropriate, submit/commit an update. If any ports have already been updated,

Re: pkg/ports system terribly messed up?

2014-09-30 Thread Rainer Hurling
Am 30.09.2014 um 08:13 schrieb O. Hartmann: Hello. I just made the last update of the ports yesterday (I use portmaster -da performing this task) and obviously or superficially everything went all right. I'm running on the boxes in question most recent CURRENT. On one system, a

Re: FreeBSD Port: engrampa-1.8.0

2014-09-30 Thread Scot Hetzel
On Mon, Sep 29, 2014 at 1:37 PM, Dave Babb dcbd...@comcast.net wrote: One more issue I forgot to mention...On the website, under portsthe website is also reporting the wrong package name.. The package name is not wrong, as the py-gobject port can be built against different versions of

INDEX build failed for 8.x

2014-09-30 Thread Ports Index build
INDEX build failed with errors: Generating INDEX-8 - please wait..--- describe.accessibility --- --- describe.arabic --- --- describe.archivers --- --- describe.arabic --- make[5]: /home/indexbuild/tindex/ports/Mk/bsd.port.mk line 1209: UNAME_r (10.1-PRERELEASE) and OSVERSION (804505) do not

Re: bash velnerability

2014-09-30 Thread Jung-uk Kim
On 2014-09-29 12:13:15 -0400, Bryan Drewery wrote: On 9/29/2014 11:01 AM, Mike Tancsa wrote: On 9/26/2014 5:01 PM, Bryan Drewery wrote: On 9/26/2014 12:41 PM, Bryan Drewery wrote: On 9/26/2014 11:51 AM, Bryan Drewery wrote: On 9/26/2014 11:46 AM, Bartek Rutkowski wrote: Apparently, the full

Re: bash velnerability

2014-09-30 Thread Jason Hellenthal
echo Testing Exploit 1 (CVE-2014-6271) CVE6271=$(env x='() { :;}; echo -n V' bash -c : 2/dev/null) [ ${CVE7187} == V ] echo VULNERABLE || echo NOT VULNERABLE echo Testing Exploit 2 (CVE-2014-7169) CVE7169=$(env X='() { (4lpi.com)=\' bash -c echo date 2/dev/null; cat echo 2/dev/null; rm -f echo)

Building mongodb with Poudriere?

2014-09-30 Thread Patrick Gibson
I'm having a tough time trying to build the latest databases/mongodb (2.6.4) using Poudriere. The host and target is FreeBSD 10 amd64. Here's the resulting log where it fails. Has anyone else experienced this? c++ -o

Re: bash velnerability

2014-09-30 Thread Bryan Drewery
On 9/30/2014 1:54 PM, Jung-uk Kim wrote: On 2014-09-29 12:13:15 -0400, Bryan Drewery wrote: On 9/29/2014 11:01 AM, Mike Tancsa wrote: On 9/26/2014 5:01 PM, Bryan Drewery wrote: On 9/26/2014 12:41 PM, Bryan Drewery wrote: On 9/26/2014 11:51 AM, Bryan Drewery wrote: On 9/26/2014 11:46 AM,

Re: bash velnerability

2014-09-30 Thread Jung-uk Kim
On 2014-09-30 14:58:07 -0400, Jason Hellenthal wrote: echo Testing Exploit 1 (CVE-2014-6271) CVE6271=$(env x='() { :;}; echo -n V' bash -c : 2/dev/null) [ ${CVE7187} == V ] echo VULNERABLE || echo NOT VULNERABLE echo Testing Exploit 2 (CVE-2014-7169) CVE7169=$(env X='() { (4lpi.com)=\'

INDEX now builds successfully on 8.x

2014-09-30 Thread Ports Index build
___ freebsd-ports@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ports To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org

Re: bash velnerability

2014-09-30 Thread Charles Swiger
On Sep 30, 2014, at 12:46 PM, Bryan Drewery bdrew...@freebsd.org wrote: [ ... ] I even saw a reddit post last night complaining that OSX had updated bash only to leave it still vulnerable because of the redir_stack issue. It doesn't seem to be? bash-3.2$ bash --version GNU bash, version

Re: bash velnerability

2014-09-30 Thread Jason Hellenthal
I would agree with that. Considering the korn shell was found out to be importing functions from bash this morning that it does not completely know how to interpret goes to say that there is a much bigger issue at face here than the mere sys admins can begin to fathom quite yet. There is still

Re: bash velnerability

2014-09-30 Thread Mike Tancsa
On 9/30/2014 5:25 PM, Charles Swiger wrote: bash-3.2$ echo Testing Exploit 4 (CVE-2014-7186) Testing Exploit 4 (CVE-2014-7186) bash-3.2$ CVE7186=$(bash -c 'true EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF' 2/dev/null ||echo -n V) bash-3.2$ [ ${CVE7186} == V ] echo VULNERABLE ||

Re: bash velnerability

2014-09-30 Thread Jung-uk Kim
On 2014-09-30 18:00:31 -0400, Mike Tancsa wrote: On 9/30/2014 5:25 PM, Charles Swiger wrote: bash-3.2$ echo Testing Exploit 4 (CVE-2014-7186) Testing Exploit 4 (CVE-2014-7186) bash-3.2$ CVE7186=$(bash -c 'true EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF EOF' 2/dev/null ||echo -n V)

Re: bash velnerability

2014-09-30 Thread Charles Swiger
On Sep 30, 2014, at 3:08 PM, Jung-uk Kim j...@freebsd.org wrote: On 2014-09-30 18:00:31 -0400, Mike Tancsa wrote: On 9/30/2014 5:25 PM, Charles Swiger wrote: bash-3.2$ echo Testing Exploit 4 (CVE-2014-7186) Testing Exploit 4 (CVE-2014-7186) bash-3.2$ CVE7186=$(bash -c 'true EOF EOF EOF EOF

Re: bash velnerability

2014-09-30 Thread Bryan Drewery
On 9/30/2014 1:54 PM, Jung-uk Kim wrote: On 2014-09-29 12:13:15 -0400, Bryan Drewery wrote: On 9/29/2014 11:01 AM, Mike Tancsa wrote: On 9/26/2014 5:01 PM, Bryan Drewery wrote: On 9/26/2014 12:41 PM, Bryan Drewery wrote: On 9/26/2014 11:51 AM, Bryan Drewery wrote: On 9/26/2014 11:46 AM,