Date: Fri, 2 Sep 2011 01:41:08 -0700 From: Jeremy Chadwick <freebsd@jdc.parodius.com> To: Pavel Timofeev <timp87@gmail.com> Cc: apache@FreeBSD.org Subject: Re: Install apache-2.2.20 Message-ID: <20110902084108.GA46572@icarus.home.lan> In-Reply-To: <CAAoTqfuCAQ2-bUYJD35Xj_kZ_Mc7H-Y3fgPuD-13L8rLm8%2BbUw@mail.gmail.com> References: <CAAoTqfuCAQ2-bUYJD35Xj_kZ_Mc7H-Y3fgPuD-13L8rLm8%2BbUw@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Sep 02, 2011 at 12:06:26PM +0400, Pavel Timofeev wrote: > Hi, there's a problem > [root@timbsd /usr/ports/www/apache22]# make > > To enable a module category: WITH_<CATEGORY>_MODULES > To disable a module category: WITHOUT_<CATEGORY>_MODULES > > Per default categories are: > AUTH AUTHN AUTHZ DAV CACHE MISC > Categories available: > AUTH AUTHN AUTHZ CACHE DAV EXPERIMENTAL LDAP MISC PROXY SSL SUEXEC > THREADS > > To see all available knobs, type make show-options > To see all modules in different categories, type make show-categories > You can check your modules configuration by using make show-modules > > ===> apache-2.2.20 has known vulnerabilities: > => apache -- Range header DoS vulnerability. > Reference: > http://portaudit.FreeBSD.org/7f6108d2-cea8-11e0-9d58-0800279895ea.html > => Please update your ports tree and try again. > *** Error code 1 > > Stop in /usr/ports/www/apache22. > *** Error code 1 > > Stop in /usr/ports/www/apache22. Looks like someone may have screwed up the portaudit (security/vuxml) update. You can override this by doing: cd /usr/ports/www/apache22 DISABLE_VULNERABILITIES=true make DISABLE_VULNERABILITIES=true make install Etc... -- | Jeremy Chadwick jdc at parodius.com | | Parodius Networking http://www.parodius.com/ | | UNIX Systems Administrator Mountain View, CA, US | | Making life hard for others since 1977. PGP 4BD6C0CB |
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20110902084108.GA46572>