Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 May 2010 22:05:58 +0200
From:      Niels Heinen <niels@FreeBSD.org>
To:        freebsd-ports@freebsd.org
Subject:   Re: spamass-milter-0.3.1_9 leaving open zombie processes.
Message-ID:  <4BE86726.4080601@FreeBSD.org>
In-Reply-To: <alpine.BSF.2.00.1005101124390.1382@pat.io.com>
References:  <alpine.BSF.2.00.1005101124390.1382@pat.io.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi Ted,

Thanks for pointing this out!
Can you perhaps send me a port diff? (will shorten the ETA)

Thanks,
Niels

On 05/10/10 21:07, Ted Hatfield wrote:
> 
> spamass-milter-0.3.0_9 appears to be an update to fix the security
> vulnerability referenced by CVE-2010-1132.
> 
> However the patch installed for this vulnerability fails to close
> processes properly and spamass-milter leaves a large number of zombie
> processes open until the milter is restarted.
> 
> Rather than wait for the port maintainer to update this port we
> installed the patches found at http://savannah.nongnu.org/bugs/?29326
> 
> Specifically
> file #20020:  spamass-milter-0.3.1-syntax.patch
> file #20284:  spamass-milter-0.3.1-popen.patch
> 
> If anyone wants to see tham I have included the patches I used.
> 
> Does anyone have an ETA for an official update.
> 
> Thank,
> 
> Ted Hatfield
> PrismNet Ltd.
> IO.COM.
> 
> 
> 
> _______________________________________________
> freebsd-ports@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-ports
> To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org"

-- 
Niels Heinen
FreeBSD committer | www.freebsd.org
PGP: 0x5FE39B80




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4BE86726.4080601>