spamass-milter-0.3.1_9 leaving open zombie processes.
Niels Heinen
niels at FreeBSD.org
Mon May 10 20:18:03 UTC 2010
Hi Ted,
Thanks for pointing this out!
Can you perhaps send me a port diff? (will shorten the ETA)
Thanks,
Niels
On 05/10/10 21:07, Ted Hatfield wrote:
>
> spamass-milter-0.3.0_9 appears to be an update to fix the security
> vulnerability referenced by CVE-2010-1132.
>
> However the patch installed for this vulnerability fails to close
> processes properly and spamass-milter leaves a large number of zombie
> processes open until the milter is restarted.
>
> Rather than wait for the port maintainer to update this port we
> installed the patches found at http://savannah.nongnu.org/bugs/?29326
>
> Specifically
> file #20020: spamass-milter-0.3.1-syntax.patch
> file #20284: spamass-milter-0.3.1-popen.patch
>
> If anyone wants to see tham I have included the patches I used.
>
> Does anyone have an ETA for an official update.
>
> Thank,
>
> Ted Hatfield
> PrismNet Ltd.
> IO.COM.
>
>
>
> _______________________________________________
> freebsd-ports at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-ports
> To unsubscribe, send any mail to "freebsd-ports-unsubscribe at freebsd.org"
--
Niels Heinen
FreeBSD committer | www.freebsd.org
PGP: 0x5FE39B80
More information about the freebsd-ports
mailing list