Date: Mon, 10 May 2010 22:05:58 +0200 From: Niels Heinen <niels@FreeBSD.org> To: freebsd-ports@freebsd.org Subject: Re: spamass-milter-0.3.1_9 leaving open zombie processes. Message-ID: <4BE86726.4080601@FreeBSD.org> In-Reply-To: <alpine.BSF.2.00.1005101124390.1382@pat.io.com> References: <alpine.BSF.2.00.1005101124390.1382@pat.io.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Ted, Thanks for pointing this out! Can you perhaps send me a port diff? (will shorten the ETA) Thanks, Niels On 05/10/10 21:07, Ted Hatfield wrote: > > spamass-milter-0.3.0_9 appears to be an update to fix the security > vulnerability referenced by CVE-2010-1132. > > However the patch installed for this vulnerability fails to close > processes properly and spamass-milter leaves a large number of zombie > processes open until the milter is restarted. > > Rather than wait for the port maintainer to update this port we > installed the patches found at http://savannah.nongnu.org/bugs/?29326 > > Specifically > file #20020: spamass-milter-0.3.1-syntax.patch > file #20284: spamass-milter-0.3.1-popen.patch > > If anyone wants to see tham I have included the patches I used. > > Does anyone have an ETA for an official update. > > Thank, > > Ted Hatfield > PrismNet Ltd. > IO.COM. > > > > _______________________________________________ > freebsd-ports@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org" -- Niels Heinen FreeBSD committer | www.freebsd.org PGP: 0x5FE39B80
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4BE86726.4080601>