From owner-freebsd-stable@FreeBSD.ORG Fri Jan 19 06:54:41 2007 Return-Path: X-Original-To: freebsd-stable@freebsd.org Delivered-To: freebsd-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id BFA9916A412 for ; Fri, 19 Jan 2007 06:54:41 +0000 (UTC) (envelope-from bazerka@beardz.net) Received: from mail.btshosting.co.uk (mail.btshosting.co.uk [213.228.232.37]) by mx1.freebsd.org (Postfix) with ESMTP id 4978513C457 for ; Fri, 19 Jan 2007 06:54:41 +0000 (UTC) (envelope-from bazerka@beardz.net) Received: from [192.168.0.3] (host86-140-13-55.range86-140.btcentralplus.com [86.140.13.55]) (authenticated bits=0) by mail.btshosting.co.uk (8.13.8/8.13.8) with ESMTP id l0J6Q89f002195; Fri, 19 Jan 2007 06:26:08 GMT Message-ID: <45B06508.5010105@beardz.net> Date: Fri, 19 Jan 2007 06:28:24 +0000 From: Jase Thew User-Agent: Thunderbird 1.5.0.9 (Windows/20061207) MIME-Version: 1.0 To: Par Leijonhufvud References: <20070117052423.GC23307@ojibwe.hunter-gatherer.org> <20070117075155.089ccb32.torfinn.ingolfsen@broadpark.no> <20070118050044.GA827@ojibwe.hunter-gatherer.org> <45AF8089.6030007@pp.nic.fi> <20070119042501.GB91514@ojibwe.hunter-gatherer.org> In-Reply-To: <20070119042501.GB91514@ojibwe.hunter-gatherer.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Scanned: ClamAV version 0.88.6, clamav-milter version 0.88.6 on mail.btshosting.co.uk X-Virus-Status: Clean Cc: freebsd-stable@freebsd.org Subject: Re: portdowngrade/portupgrade question X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 Jan 2007 06:54:41 -0000 Par Leijonhufvud wrote: > Pertti Kosunen [2007.01.18] wrote: >>> What have I missed? >> Update your ports tree, that version of fetchmail has vulnerabilities. > > I know that. But fetching with fetchmail stopped working when I did that > (when the new port came I did a portupgrade, forgot to kill & restart > fetchmail, when I did so a day or so later it just dumped core), and > I'm trying to pin down exactly what is going wrong. As part of that I > want to try to go back to the old fetchmail and try it *fully knowing > that it has vulnerabilities*. Which appears to be either obscure, > difficult or impossible. > > /Par > portupgrade -f -m '-DDISABLE_VULNERABILITIES' fetchmail