Opened 5 years ago

Closed 5 years ago

Last modified 5 years ago

#58994 closed defect (duplicate)

openssl 1.1.1.c, mailx @12.4 rev6: mailx build error after rev update, possibly due to openssl update

Reported by: lhaeger (Lothar Haeger) Owned by: yan12125 (Chih-Hsuan Yen)
Priority: Normal Milestone:
Component: ports Version:
Keywords: Cc: larryv (Lawrence Velázquez), neverpanic (Clemens Lang)
Port: mailx

Description (last modified by jmroot (Joshua Root))

Trying to update mailx form 12.4 rev5 to 12.4 rev6 gives me:

$ sudo port install -vst mailx
--->  Computing dependencies for mailx
--->  Fetching distfiles for mailx
--->  Attempting to fetch mailx-12.4.tar.bz2 from http://nue.de.distfiles.macports.org/mailx
--->  Verifying checksums for mailx
--->  Extracting mailx
--->  Applying patches to mailx
--->  Configuring mailx
--->  Building mailx
Error: Failed to build mailx: command execution failed
Error: See /opt/local/var/macports/logs/_opt_local_var_macports_sources_rsync.macports.org_macports_release_tarballs_ports_mail_mailx/mailx/main.log for details.
Error: Follow https://guide.macports.org/#project.tickets to report a bug.
Error: Processing of port mailx failed

Running the build command manually shows:

$ sudo /usr/bin/make -j4 -w all                                                                                                                                                                      make: Entering directory `/opt/local/var/macports/build/_opt_local_var_macports_sources_rsync.macports.org_macports_release_tarballs_ports_mail_mailx/mailx/work/mailx-12.4'
/usr/bin/clang -L/opt/local/lib -Wl,-headerpad_max_install_names -arch x86_64 aux.o base64.o cache.o cmd1.o cmd2.o cmd3.o cmdtab.o collect.o dotlock.o edit.o fio.o getname.o getopt.o head.o hmac.o imap.o imap_search.o junk.o lex.o list.o lzw.o macro.o maildir.o main.o md5.o mime.o names.o nss.o openssl.o pop3.o popen.o quit.o send.o sendout.o smtp.o ssl.o strings.o temp.o thread.o tty.o v7.local.o vars.o version.o `grep '^[^#]' LIBS`  -o mailx
Undefined symbols for architecture x86_64:
  "_RAND_egd", referenced from:
      _ssl_init in openssl.o
  "_SSLv3_client_method", referenced from:
      _ssl_open in openssl.o
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
make: *** [mailx] Error 1
make: Leaving directory `/opt/local/var/macports/build/_opt_local_var_macports_sources_rsync.macports.org_macports_release_tarballs_ports_mail_mailx/mailx/work/mailx-12.4'

I've installed mailx 12.4 rev5 only a few hours ago when I still had openssl 1.0.2s installed. While running "port upgrade outdated", openssl was first updated to 1.1.1c and then the attempt updating mailx to 12.4 rev6 failed as above.

Change History (5)

comment:1 Changed 5 years ago by lhaeger (Lothar Haeger)

Description: modified (diff)
Summary: openssl 1.1.c, mailx @12.4.6: mailx build error after rev update, possibly due to openssl updateopenssl 1.1.1.c, mailx @12.4 rev6: mailx build error after rev update, possibly due to openssl update

comment:2 Changed 5 years ago by yan12125 (Chih-Hsuan Yen)

Resolution: duplicate
Status: assignedclosed

Thanks for the report. This is a duplicate of ticket:58990 and I'm working on it.

comment:3 Changed 5 years ago by jmroot (Joshua Root)

Description: modified (diff)

comment:4 Changed 5 years ago by mf2k (Frank Schima)

Port: openssl removed

comment:5 Changed 5 years ago by Chih-Hsuan Yen <yan12125@…>

In 7f640d17a837219da0ecc791ada312f153e7b1ce/macports-ports (master):

s-nail: new port, a maintained fork of mail/mailx

The Portfile is based on mail/mailx and PKGBUILD from Arch Linux [1].

Notes for patches:

  • patch-junk.c: there is no longer junk.c or similar files in s-nail.
  • patch-maildir.c: the issue seems already fixed in s-nail.
  • patch-makeconfig & patch-openssl.c: for newer OpenSSL, which is already supported by s-nail.
  • patch-Makefile: s-nail's build system uses VAL_* variables for specifying installation paths, and compilation-related environment variables are honored.
  • patches for CVE-2004-2771 and CVE-2014-7844: the vulnerability has been fixed in s-nail 14.7.9 [2].

Ref: #58990
Ref: #58994

[1] https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/s-nail
[2] https://salsa.debian.org/debian/s-nail/blob/master/README

Note: See TracTickets for help on using tickets.