On Tuesday, 16 August 2016, pathiaki2 via freebsd-ports <
freebsd-ports@freebsd.org> wrote:
> http://switch.dl.sourceforge.net/sourceforge/mailwatch
>
> www.mailwatch.org
>
> I have found that Mailscanner is a more simple solution than Amavis.
> However, it does need a user interface similar to Am
Hi,
For about a week now I have been having some build failures
that cause a lot of dependent port builds in poudriere
to get skipped.
Focusing on one of the first ones, net/qt5-network fails
in 'build'.
poudriere tells me it saved the wrkdir to:
/ssd1/poudriere/data/wrkdirs/10-stable-amd64-def
On 16 Aug 2016, JosC wrote:
In the absence of running 'pkg audit -F', only
the"LOCALBASE/periodic/security/410.pkg-audit script updates the vuxml
file and audit results. Until that happens, or pkg audit -F is run, pkg
will still see an older version.
Thinking with you I now ask myself:
- Would
http://switch.dl.sourceforge.net/sourceforge/mailwatch
www.mailwatch.org
I have found that Mailscanner is a more simple solution than Amavis.
However, it does need a user interface similar to Amavis' Maia.
Mailwatch is the equivalent for MailScanner.
Thank you,
Paul Pathiakis
___
On Tue, 16 Aug 2016, Mathieu Arnold wrote:
+--On 15 août 2016 20:35:56 -0600 Warren Block wrote:
| On Mon, 15 Aug 2016, Mathieu Arnold wrote:
|
|> Something changed, at one point, make missing used to work right.
|>
|> Could you open a PR with all that information, so that it doesn't get
|> l
In een bericht van 16-8-2016 11:07:
Try running pkg audit -F to force updating/refreshing the latest VuXML
changes.
In this case the lang/perl5.20 (port) version string that the fix was
made in [1], was only added to an existing entry in security/vuxml as an
'update' yesterday [2]
[1] http://s
On 16/08/2016 6:55 PM, JosC wrote:
> Still get this port upgrade error:
>
> --- cut text ---
>
> ===>>> All >> perl5-5.20.3_14 (1/1)
> ===> Cleaning for perl5-5.20.3_15
> ===> perl5-5.20.3_15 has known vulnerabilities:
> perl5-5.20.3_15 is vulnerable:
> p5-XSLoader -- local arbitrary code execu
Still get this port upgrade error:
--- cut text ---
===>>> All >> perl5-5.20.3_14 (1/1)
===> Cleaning for perl5-5.20.3_15
===> perl5-5.20.3_15 has known vulnerabilities:
perl5-5.20.3_15 is vulnerable:
p5-XSLoader -- local arbitrary code execution
CVE: CVE-2016-6185
WWW:
https://vuxml.FreeBSD.
+--On 15 août 2016 20:35:56 -0600 Warren Block wrote:
| On Mon, 15 Aug 2016, Mathieu Arnold wrote:
|
|> Something changed, at one point, make missing used to work right.
|>
|> Could you open a PR with all that information, so that it doesn't get
|> lost ?
|
| I reviewed https://reviews.freebs