notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Current status

The server has been repaired, with a new power supply, for $23. I am waiting for lower COVID rates before visiting the datacenter to return it.
Sanity Test Failure
Thu, 28 Jan 2016
[ 11:50 pi ] Original commit   Revision:407407
mutt mail  Refresh files touched by this commit  An older version of this port was marked as vulnerable. Small but powerful text based program for read/writing e-mail
mail/mutt: provide options to build with GSSAPI variants

The port rolls its own GSSAPI handling system, looking for installed
libraries, rather than employing the "Uses" knobs (which probably
post-date the mutt Port's GSSAPI support).

When linking against OpenSSL from Ports, this results in one mutt
process pulling in both libcrypto.so.8 from Ports and libcrypto.so.7
from the base system (FreeBSD 10.1), leading to environ corruption
problems when running external commands, which complain at startup
(libc routines detect the corruption).  These look like:

    sh: environment corrupt; missing value for SOME_VAR

and can be seen when, eg, viewing a PGP-signed mail with GnuPG
integration turned on.

This patch switches mail/mutt to use the GSSAPI "Uses" system.

PR:		206220
Submitted by:	Phil Pennock <freebsd@phil.spodhuis.org>
Approved by:	Udo Schweigert <Udo.Schweigert@siemens.com> (maintainer)

Sanity Test Results

mail/mutt:

This command (FreshPorts code 2):

/usr/local/bin/sudo /usr/sbin/chroot -u dan /usr/FreshPorts/ports-jail
/make-showconfig.sh /usr/local/PORTS-head mail/mutt
2>/tmp/FreshPorts.mail.mutt.showconfig.2016.1.28.11.51.10.28788

produced this error:

Make results are : ====> You must select one and only one option from the
GSSAPI single
*** Error code 1

Stop.
make: stopped in /usr/local/PORTS-head/mail/mutt
Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
gitlab-ceMar 05
asterisk16Mar 04
asterisk18Mar 04
chromiumMar 04
jasperMar 03
py-saltMar 03
vaultFeb 27
redisFeb 23
redis-develFeb 23
redis5Feb 23
zeekFeb 22
jenkinsFeb 20
raptor2Feb 20
asterisk13Feb 18
asterisk13Feb 18

10 vulnerabilities affecting 79 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2021-03-05 21:21:29


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 42700
Broken 75
Deprecated 166
Ignore 313
Forbidden 4
Restricted 139
No CDROM 71
Vulnerable 19
Expired 36
Set to expire 142
Interactive 0
new 24 hours 18
new 48 hours22
new 7 days45
new fortnight105
new month165



Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2021 Dan Langille. All rights reserved.