ports/108224: security/sguil-sensor, patches improperly applied
Paul Schmehl
pauls at utdallas.edu
Mon Jan 22 22:30:17 UTC 2007
>Number: 108224
>Category: ports
>Synopsis: security/sguil-sensor, patches improperly applied
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: maintainer-update
>Submitter-Id: current-users
>Arrival-Date: Mon Jan 22 22:30:16 GMT 2007
>Closed-Date:
>Last-Modified:
>Originator: Paul Schmehl
>Release: FreeBSD 6.0-RELEASE-p15 amd64
>Organization:
The University of Texas at Dallas
>Environment:
System: FreeBSD hostname.utdallas.edu 6.0-RELEASE-p15 FreeBSD 6.0-RELEASE-p15 #2: Mon Oct 16 21:28:21 UTC 2006 root at hostname.utdallas.edu:/usr/obj/usr/src/sys/SMPKERNEL amd64
>Description:
The patch to the init script that I supplied was *supposed* to be
applied to the script, *not* placed in ${FILESDIR}. Whoever committed
the port improperly added the patch to the ${FILESDIR} instead of updating
the sensor-agent.sh.in file in the ${FILESDIR}.
>How-To-Repeat:
>Fix:
Apply the patch-sensor-agent.sh.in patch to the sensor-agent.sh.in file
in the ${FILESDIR} and then commit the port.
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list