From owner-freebsd-ports@FreeBSD.ORG Sat Dec 6 22:35:31 2014 Return-Path: Delivered-To: ports@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 1C296E7B; Sat, 6 Dec 2014 22:35:31 +0000 (UTC) Received: from smtp.digiware.nl (unknown [IPv6:2001:4cb8:90:ffff::3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D2C73AD1; Sat, 6 Dec 2014 22:35:30 +0000 (UTC) Received: from rack1.digiware.nl (unknown [127.0.0.1]) by smtp.digiware.nl (Postfix) with ESMTP id 5DD6716A402; Sat, 6 Dec 2014 23:35:28 +0100 (CET) X-Virus-Scanned: amavisd-new at digiware.nl Received: from smtp.digiware.nl ([127.0.0.1]) by rack1.digiware.nl (rack1.digiware.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wIupouNghdtf; Sat, 6 Dec 2014 23:34:59 +0100 (CET) Received: from [192.168.10.9] (vaio [192.168.10.9]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.digiware.nl (Postfix) with ESMTPSA id 3DEC116A401; Sat, 6 Dec 2014 23:34:59 +0100 (CET) Message-ID: <54838493.5020603@digiware.nl> Date: Sat, 06 Dec 2014 23:34:59 +0100 From: Willem Jan Withagen User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0 MIME-Version: 1.0 To: Baptiste Daroussin , ports@FreeBSD.org, current@FreeBSD.org, stable@FreeBSD.org Subject: Re: [CFT] pkg 1.4.0 rc2 References: <20141206124029.GB72593@ivaldir.etoilebsd.net> In-Reply-To: <20141206124029.GB72593@ivaldir.etoilebsd.net> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 06 Dec 2014 22:35:31 -0000 On 6-12-2014 13:40, Baptiste Daroussin wrote: > Hi, > > We have released a new 1.4.0 rc2 version of pkg (available in > ports-mgmt/pkg-devel) since first beta it has received tons of bug fixes and > should be now way more reliable and able to handle ootb without mistakes > upgrades like the gettext one and the perl one. > > All reported issues should have been fixed since. > > Please test that new version I would like to make it the final release if > possible. I missed the previous announcement, but this is "bothering" me for some time already.... I'm using this simple cronic script to reduce traffic from scripts with nothing serious to report. But pkg still triggers: ----- # sudo cronic pkg audit -F Cronic detected failure or error output for the command: pkg audit -F RESULT CODE: 0 ERROR OUTPUT: pkg: vulnxml file up-to-date ------ And I wonder why this informational message is reported on STDERR, and other real problems on STDOUT... ------ sudo cronic pkg audit Cronic detected failure or error output for the command: pkg audit RESULT CODE: 1 ERROR OUTPUT: STANDARD OUTPUT: phpMyAdmin-4.2.13 is vulnerable: phpMyAdmin -- XSS and DoS vulnerabilities CVE: CVE-2014-9219 CVE: CVE-2014-9218 WWW: http://portaudit.FreeBSD.org/c9c46fbf-7b83-11e4-a96e-6805ca0b3d42.html 1 problem(s) in the installed packages found. ------ I would atleast to have case 1) also write to STDOUT. And perhaps have case 2) report on STDERR. --WjW