Date: Wed, 19 Aug 2020 11:14:07 +0200 From: Christoph Kukulies <kuku@kukulies.org> To: Polytropon <freebsd@edvax.de> Cc: Ruben via freebsd-questions <freebsd-questions@freebsd.org> Subject: Re: Mounting ext2fs - unsupported features: needs_recovery Message-ID: <2B85AB2F-8A42-4198-9EC7-E0DC761FA554@kukulies.org> In-Reply-To: <20200819111127.0ad5f54e.freebsd@edvax.de> References: <9C03454A-F9B5-48A9-BDAB-C02BB1C6452B@kukulies.org> <20200819111127.0ad5f54e.freebsd@edvax.de>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] Did so, but… Installing fusefs-ext4fuse-0.1.3_1,1... Please note that that this port only supports ext4 in read-only mode. You might want to consider using sysutils/fusefs-ext2 which supports ext2, ext3 and ext4 with read write support. ===> NOTICE: This port is deprecated; you may wish to reconsider installing it: Please consider using sysutils/fusefs-ext2 as upstream development is stalled. Contrary to what its name suggests it supports ext2, ext3, ext4 in read/write mode.. It is scheduled to be removed on or after 2019-12-01. and later…: ===> e2fsprogs-1.45.3_2 has known vulnerabilities: e2fsprogs-1.45.3_2 is vulnerable: e2fsprogs -- rehash.c/pass 3a mutate_name() code execution vulnerability CVE: CVE-2019-5188 WWW: https://vuxml.FreeBSD.org/freebsd/8b61308b-322a-11ea-b34b-1de6fb24355d.html e2fsprogs-1.45.3_2 is vulnerable: e2fsprogs -- maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck CVE: CVE-2019-5094 WWW: https://vuxml.FreeBSD.org/freebsd/ad3451b9-23e0-11ea-8b36-f1925a339a82.html 2 problem(s) in 1 installed package(s) found. => Please update your ports tree and try again. => Note: Vulnerable ports are marked as such even if there is no update available. => If you wish to ignore this vulnerability rebuild with 'make DISABLE_VULNERABILITIES=yes' *** Error code 1 Stop. make[2]: stopped in /usr/ports/sysutils/e2fsprogs *** Error code 1 Stop. make[1]: stopped in /usr/ports/sysutils/e2fsprogs *** Error code 1 Stop. make: stopped in /usr/ports/sysutils/fusefs-ext2 > Am 19.08.2020 um 11:11 schrieb Polytropon <freebsd@edvax.de>: > > On Wed, 19 Aug 2020 11:03:35 +0200, Christoph Kukulies wrote: >> I’m trying to mount a filesystem that is on an external SATA disk. >> Partition ID 0x83 (Linux). >> >> Trying to do a >> >> mount -t ext2fs /dev/da5s3 /mnt/da5s3 >> mount: /dev/da5s3: Invalid argument >> # >> >> syslog message is: >> >> WARNING: mount of da5s3 denied due to unsupported optional features: >> needs_recovery > > Maybe this is ext3 or ext4? Try using the ext4 FUSE module > (install sysutils/fusefs-ext4fuse, "kldload fuse", "service > fusefs start", and use the ext4fuse program to mount). If > you only want read access, using -r or -o ro is always a > good idea. :-) > > > > > -- > Polytropon > Magdeburg, Germany > Happy FreeBSD user since 4.0 > Andra moi ennepe, Mousa, ... [-- Attachment #2 --] 0 *H 010 `He 0 *H 00xU!`0 *H 0f10 UDE1301U *DGN Deutsches Gesundheitsnetz Service GmbH1"0 Udgnservice CA 2 Type E:PN0 200516152759Z 210516152759Z0o10 UDE1!0U400000005ec008dd373ad8ec10UChristoph Kukulies1 0 *H kuku@kukulies.org0"0 *H 0 yF(Y-0h>?S^@ؗH]hY܀J&uibCK[O'[g<8!KzDR /[r`a:`t|\i|{ ;yjO+KiֲHe|iyH #rwzrJQl>%;V) Ѿ_ע͠]E2cfGS3]ǯpv 7030Uu ( ˗V6n 0U0 0U#0Ɠdrj>TTy0VU O0M0K++0;09+-http://sec5.dgnservice.de/policies/index.html0>U705031/-http://sec5.dgnservice.de/crl/crl2-type-e.crl0U0U%0++0U0kuku@kukulies.org0 *H -@Q72R#:%ɧTcu1TJ2 #&.$Ѫ#Q9Ztx}n{$;E]H|E\@xJ=QKjmS8=|*N RO>SLLQƗ@0#̘Kȗ,_ZԌ G*l]AJܙPdMDEjC&SKRtF0d5 ڌ>מ ppّ;{_"+050UJf%0 *H 0a10 UDE1301U *DGN Deutsches Gesundheitsnetz Service GmbH10Udgnservice Root 7:PN0 161026092241Z 241026092241Z0f10 UDE1301U *DGN Deutsches Gesundheitsnetz Service GmbH1"0 Udgnservice CA 2 Type E:PN0"0 *H 0 ܥ?tǣGҗfkmaw{8㓬END'+k CNWc$н.rPR@_%x*c]3% t:djʘ:"v?MWp- !?:o2}/f\Wh!Kl |\:OE@dF!Dq#A@ u?o@00يҾCQz6nܶ6oMRZ Buӛ؎["e~@ 00U0 0U#0tr<&wIS0[+O0M0K+0?http://rocsp-dgn.dgnservice.de:8080/ejbca/publicweb/status/ocsp0jU c0a0_++0O0M+Ahttp://www.dgnservice.de/trustcenter/public/dgnservice/index.html0U00ldap://ldap.dgnservice.de:389/CN=CRL-1,O=DGN%20Service%20GmbH,C=DE?certificateRevocationList?base?objectClass=cRLDistributionPoint0UƓdrj>TTy0U0 +m0 +m0 *H 9ESj#55Gܩ _EҮ"]+8F: gV6}F+QOKW'B^DRtHxwcPO\a&J{yUdM//6n!:^ &6֗q&Chtjw;4A,+t8h{:|yl:+/6?4z1);݁ݻSjk-oǟp(IJ(ko1 100r0f10 UDE1301U *DGN Deutsches Gesundheitsnetz Service GmbH1"0 Udgnservice CA 2 Type E:PNU!`0 `He s0 *H 1 *H 0 *H 1 200819091407Z0/ *H 1" .LȮ <}F?{X?HUpW0 +71t0r0f10 UDE1301U *DGN Deutsches Gesundheitsnetz Service GmbH1"0 Udgnservice CA 2 Type E:PNU!`0*H 1tr0f10 UDE1301U *DGN Deutsches Gesundheitsnetz Service GmbH1"0 Udgnservice CA 2 Type E:PNU!`0 *H tW:/AX1)3ݘ]Z$/ͰACQqZ Qm]6HuqϏFC <p``;%ӏ|v Qt1c6ps<|>T@Ic:@psްF%XB: 0?#bNé{++A?\P1NR3:A6ǿNIm #;Cui]T_
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2B85AB2F-8A42-4198-9EC7-E0DC761FA554>
