From owner-freebsd-ports@FreeBSD.ORG Sun Sep 4 19:21:40 2011 Return-Path: Delivered-To: ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DF788106566B; Sun, 4 Sep 2011 19:21:40 +0000 (UTC) (envelope-from utisoft@gmail.com) Received: from mail-iy0-f182.google.com (mail-iy0-f182.google.com [209.85.210.182]) by mx1.freebsd.org (Postfix) with ESMTP id A164D8FC13; Sun, 4 Sep 2011 19:21:40 +0000 (UTC) Received: by iadx2 with SMTP id x2so7160617iad.13 for ; Sun, 04 Sep 2011 12:21:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type:content-transfer-encoding; bh=S40D9LCcdLITlOMZklFMxY0C4M5y5cDY6W2D4jMB8dQ=; b=SYdJS2wzv6Y1jVEeMD//ko1AR6Zj/tVhM7xdB+TJb0bnMqWcRYtUG9KqZkVLIsLzJO R7CBMDugY8CHY8LitMbeHLtlN9MFFyjDyHuZx5I8rr9EYAv7dIk3dvz5WP4oJWF/Oyc0 3BZb6WDz+Q08wg+aHLBdJseZ3hjiH33625PI0= Received: by 10.231.41.69 with SMTP id n5mr6149754ibe.92.1315164100058; Sun, 04 Sep 2011 12:21:40 -0700 (PDT) MIME-Version: 1.0 Received: by 10.231.61.148 with HTTP; Sun, 4 Sep 2011 12:21:10 -0700 (PDT) In-Reply-To: References: From: Chris Rees Date: Sun, 4 Sep 2011 20:21:10 +0100 Message-ID: To: ports@freebsd.org, yar@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Cc: Subject: Re: sysutils/cfs X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 04 Sep 2011 19:21:41 -0000 On 4 September 2011 17:56, Chris Rees wrote: > Guys, > > I've had to deprecate sysutils/cfs -- there's a confirmed issue with > failing locks [1] which has been open for two years with no fix. > > Please would someone consider stepping up to fix and maintain it? It > has two months to live. > > Thanks! > > Chris > > [1] http://www.freebsd.org/cgi/query-pr.cgi?pr=3Dports/137378 Whoops, also missed a CVE -- buffer overflows can cause a DoS. Expiration date altered to 1 month accordingly. By the way, Debian has dropped this as well, and upstream says it was due a rewrite in 2002. With the vulnerability in mind, whoever volunteers to maintain this port should probably look at becoming the upstream too. Chris --=20 Chris Rees =A0 =A0 =A0 =A0 =A0| FreeBSD Developer crees@FreeBSD.org =A0 | http://people.freebsd.org/~crees