I tried to update www/nginx today because there's a new version. However, building www/nginx stopped with Error code 1 and no additional explanation. Below is the output of running
Only after running in debug mode (
So my question is, am I doing something wrong, or should the ports have explained the problem without running make in debug mode? I did run portmaster with the verbose flag on too, but that produced no additional explanation. Another question, why did this block? According to the listed vulnerability (CVE-2014-3556) it affects nginx >=1.6.0,2 <1.6.1,2, meaning the version I was upgrading from. Is this a bug worth reporting, and if so, what should I report?
Thanks.
Edit: I forgot to mention, running with
make in the port's dir, but same output is given by portmaster.
Code:
root@azathoth:/usr/ports/www/nginx # make
*** Error code 1
Stop.
make[1]: stopped in /usr/ports/www/nginx
*** Error code 1
Stop.
make: stopped in /usr/ports/www/nginx
Only after running in debug mode (
make -dA) I got the following explanation:
Code:
1 problem(s) in the installed packages found.'
*** Failed target: check-vulnerable
*** Failed command: if [ -f "/var/db/pkg/vuln.xml" ]; then if [ -n "yes" ]; then if [ -x "/usr/local/sbin/pkg-static" ]; then vlist=`/usr/local/sbin/pkg-static audit "nginx-1.6.1,2"`; if [ "${vlist}" = "0 problem(s) in the installed packages found." ]; then vlist=""; fi; elif [ "nginx" = "pkg" ]; then vlist=""; fi; elif [ -x "/usr/local/sbin/portaudit" ]; then vlist=`/usr/local/sbin/portaudit -X 14 "nginx-1.6.1,2" 2>&1 | grep -vE '^[0-9]+ problem\(s\) found.' || true`; if [ -n "$vlist" ]; then vlist=`/usr/local/sbin/portaudit -X 14 "nginx-1.6.1,2" 2>&1 | grep -vE '^[0-9]+ problem\(s\) found.' || true`; fi ; else echo "===> portaudit database exists, however, portaudit is not installed!"; fi; if [ -n "$vlist" ]; then echo "===> nginx-1.6.1,2 has known vulnerabilities:"; echo "$vlist"; echo "=> Please update your ports tree and try again."; echo "=> Note: Vulnerable ports are marked as such even if there is no update available."; echo "=> If you wish to ignore this vulnerability rebuild with 'make DISABLE_VULNERABILITIES=yes'"; exit 1; fi; fi
*** Error code 1
Stop.
So my question is, am I doing something wrong, or should the ports have explained the problem without running make in debug mode? I did run portmaster with the verbose flag on too, but that produced no additional explanation. Another question, why did this block? According to the listed vulnerability (CVE-2014-3556) it affects nginx >=1.6.0,2 <1.6.1,2, meaning the version I was upgrading from. Is this a bug worth reporting, and if so, what should I report?
Thanks.
Edit: I forgot to mention, running with
DISABLE_VULNERABILITIES=yes fixed the issue and I was able to update nginx.