On Thu, Sep 25, 2014 at 3:05 PM, Guido Falsi <m...@madpilot.net> wrote:

> On 09/25/14 20:57, Rick Miller wrote:
> > On Thu, Sep 25, 2014 at 10:43 AM, Guido Falsi <m...@madpilot.net> wrote:
> > [snip]
>
>
> > =======================<phase: patch
> >============================
> > ===>  Patching for bash-4.3.24
> > ===>  Applying distribution patches for bash-4.3.24
> > ===>  Applying extra patch /distfiles/local-patches/8_4-amd64/bash.patch
> > ===>  Applying extra patch
> > /usr/ports/shells/bash/files/extrapatch-colonbreakswords
> > ===>  Applying extra patch
> > /usr/ports/shells/bash/files/extrapatch-implicitcd
> > ===>  Applying FreeBSD patches for bash-4.3.24
> >
> ===========================================================================
> >
> > The first sign that something didn't appear to have gone as expected was
> > that the package was built as bash-4.3.24.tbz as opposed to
> > bash-4.3.25.tbz.  The above test was executed observing the behavior of a
> > still vulnerable binary.
>
> The way you are applying the patch simply modifies the code being
> compiled by the port, you're not patching the port itself, so the port
> maintains the same version number.
>

Makes sense



> > The test was performed on an 8.4 host with a [unpatched] bash-4.3.24
> after
> > forcefully removing the package and adding the new, patched package.  It
> > complained of dependencies on packages that were already installed, but
> not
> > up to the version of the dependency.  After manually fixing these
> > dependencies (forcefully deleting the existing dependencies and
> installing
> > the new ones), the test was executed once again to the same results.
> >
> > Could this be an issue of the order the patches were applied in or ??
>
> You should check the build log and see if in the patching phase there
> was any error.
>

The above log snippet is from the patch phase of the build indicating
success (well, at least no error).  A build with the wrong patch was
attempted that did indicate errors, as expected.

The full log can be viewed at http://pastebin.com/hwHwJAKK

Is there some way in the log to identify if the source was patched and
built correctly?  Does Poudriere [ I say Poudriere realizing that it likely
does not, but perhaps the system does? ] provide the ability to review the
source code after patching to actually verify the patch was applied?  A
cursory search of the filesystem where Poudriere stores the jail turned up
no leads.

-- 
Take care
Rick Miller
_______________________________________________
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscr...@freebsd.org"

Reply via email to