ports/108224: security/sguil-sensor, patches improperly applied

Paul Schmehl pauls at utdallas.edu
Mon Jan 22 22:30:17 UTC 2007


>Number:         108224
>Category:       ports
>Synopsis:       security/sguil-sensor, patches improperly applied
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Mon Jan 22 22:30:16 GMT 2007
>Closed-Date:
>Last-Modified:
>Originator:     Paul Schmehl
>Release:        FreeBSD 6.0-RELEASE-p15 amd64
>Organization:
The University of Texas at Dallas
>Environment:
System: FreeBSD hostname.utdallas.edu 6.0-RELEASE-p15 FreeBSD 6.0-RELEASE-p15 #2: Mon Oct 16 21:28:21 UTC 2006 root at hostname.utdallas.edu:/usr/obj/usr/src/sys/SMPKERNEL amd64


	
>Description:
	The patch to the init script that I supplied was *supposed* to be
	applied to the script, *not* placed in ${FILESDIR}.  Whoever committed
	the port improperly added the patch to the ${FILESDIR} instead of updating
	the sensor-agent.sh.in file in the ${FILESDIR}.
>How-To-Repeat:
	
>Fix:

	Apply the patch-sensor-agent.sh.in patch to the sensor-agent.sh.in file
	in the ${FILESDIR} and then commit the port.


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list