Date: Fri, 26 Jun 2009 16:20:02 GMT From: Bjoern Engels <engels@openit.de> To: freebsd-ports-bugs@FreeBSD.org Subject: Re: ports/136070: [security] please update net-mgmt/nfsen to 1.3.2 Message-ID: <200906261620.n5QGK2SS031973@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/136070; it has been noted by GNATS. From: Bjoern Engels <engels@openit.de> To: bug-followup@FreeBSD.org, engels@openit.de Cc: Subject: Re: ports/136070: [security] please update net-mgmt/nfsen to 1.3.2 Date: Fri, 26 Jun 2009 17:47:23 +0200 --cmJC7u66zC7hs+87 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Hi, please find attached patch file to mark ports/net-mgmt/nfsen as FORBIDDEN. Kind regards Bjoern -- Bjoern Engels OpenIT GmbH engels@openit.de In der Steele 33a-41 PGP keyID 1024D/895F13C3 D-40599 Duesseldorf ________________________________________________________________________ HRB 38815 Amtsgericht Duesseldorf USt-Id DE 812951861 Geschaeftsfuehrer: Oliver Haakert, Maurice Kemmann --cmJC7u66zC7hs+87 Content-Type: text/plain; charset=utf-8 Content-Disposition: attachment; filename="nfsen.patch" --- ports/net-mgmt/nfsen/Makefile.orig Fri Jun 26 17:34:21 2009 +++ ports/net-mgmt/nfsen/Makefile Fri Jun 26 17:45:52 2009 @@ -16,6 +16,8 @@ MAINTAINER= janos.mohacsi@bsd.hu COMMENT= Web based frontend to nfdump netflow collector +FORBIDDEN= remote command execution vulnerability http://sourceforge.net/forum/forum.php?forum_id=967583 + RUN_DEPENDS= ${SITE_PERL}/RRDp.pm:${PORTSDIR}/databases/rrdtool \ ${SITE_PERL}/Mail/Header.pm:${PORTSDIR}/mail/p5-Mail-Tools \ nfdump:${PORTSDIR}/net-mgmt/nfdump --cmJC7u66zC7hs+87--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200906261620.n5QGK2SS031973>