From owner-freebsd-ports@FreeBSD.ORG Mon Sep 5 17:32:02 2011 Return-Path: Delivered-To: ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4FB14106566B; Mon, 5 Sep 2011 17:32:02 +0000 (UTC) (envelope-from utisoft@gmail.com) Received: from mail-yx0-f182.google.com (mail-yx0-f182.google.com [209.85.213.182]) by mx1.freebsd.org (Postfix) with ESMTP id F0EF08FC1C; Mon, 5 Sep 2011 17:32:01 +0000 (UTC) Received: by yxn22 with SMTP id 22so2856220yxn.13 for ; Mon, 05 Sep 2011 10:32:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=GuUJVCnjgiHyTY/UTN/IZfekgTSr+FXxnf4gt+d2/nY=; b=OhIOeiftzPlwM41W37GNTRZMrq7iW7erzqo+1F68dWwAz/SNOpZmQQnJrbHb0qJpNI creaVG/PBo23Yv/HEeDucQWIQiT9TrUMF28Up/ie4EDpY41TN5mPxlhClbRu/smGvdEZ uGTkFZhHLRsrOHx/zYH7QQ2vI2oMW7Y4n3uAE= MIME-Version: 1.0 Received: by 10.43.44.73 with SMTP id uf9mr3792015icb.507.1315243921159; Mon, 05 Sep 2011 10:32:01 -0700 (PDT) Received: by 10.231.61.148 with HTTP; Mon, 5 Sep 2011 10:32:00 -0700 (PDT) Received: by 10.231.61.148 with HTTP; Mon, 5 Sep 2011 10:32:00 -0700 (PDT) In-Reply-To: <4E6503C2.5080002@aldan.algebra.com> References: <4E6503C2.5080002@aldan.algebra.com> Date: Mon, 5 Sep 2011 18:32:00 +0100 Message-ID: From: Chris Rees To: "Mikhail T." Content-Type: text/plain; charset=ISO-8859-1 X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: ports@freebsd.org, yar@freebsd.org Subject: Re: Re: sysutils/cfs X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Sep 2011 17:32:02 -0000 On 5 Sep 2011 18:15, "Mikhail T." wrote: > > On -10.01.-28163 14:59, Chris Rees wrote: >>> >>> I've had to deprecate sysutils/cfs -- there's a confirmed issue with >>> failing locks [1] which has been open for two years with no fix. >>> >> >> Whoops, also missed a CVE -- buffer overflows can cause a DoS. >> Expiration date altered to 1 month accordingly. > > > Is this the only vulnerability you are talking about? >> >> http://www.debian.org/security/2006/dsa-1138 > > Does not seem hard to fix at all... Listing all of the fatal problems would be helpful... >> >> -mi If it's not that hard to fix then do it. If you're not going to fix it, why are you even commenting? More noise. Stop whining and do something about it. I saw a port that is: - broken - vulnerable - unmaintained - dead upstream - has been removed by other distributions I don't use it, you don't use it, why do you care? Chris