spamass-milter-0.3.1_9 leaving open zombie processes.

Niels Heinen niels at FreeBSD.org
Mon May 10 20:18:03 UTC 2010


Hi Ted,

Thanks for pointing this out!
Can you perhaps send me a port diff? (will shorten the ETA)

Thanks,
Niels

On 05/10/10 21:07, Ted Hatfield wrote:
> 
> spamass-milter-0.3.0_9 appears to be an update to fix the security
> vulnerability referenced by CVE-2010-1132.
> 
> However the patch installed for this vulnerability fails to close
> processes properly and spamass-milter leaves a large number of zombie
> processes open until the milter is restarted.
> 
> Rather than wait for the port maintainer to update this port we
> installed the patches found at http://savannah.nongnu.org/bugs/?29326
> 
> Specifically
> file #20020:  spamass-milter-0.3.1-syntax.patch
> file #20284:  spamass-milter-0.3.1-popen.patch
> 
> If anyone wants to see tham I have included the patches I used.
> 
> Does anyone have an ETA for an official update.
> 
> Thank,
> 
> Ted Hatfield
> PrismNet Ltd.
> IO.COM.
> 
> 
> 
> _______________________________________________
> freebsd-ports at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-ports
> To unsubscribe, send any mail to "freebsd-ports-unsubscribe at freebsd.org"

-- 
Niels Heinen
FreeBSD committer | www.freebsd.org
PGP: 0x5FE39B80



More information about the freebsd-ports mailing list