Here is a patch to upgrade the net-im/openfire port to the latest release. This fixes a security vulnerability that leaves servers open to a DoS attack: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1728
State Changed From-To: open->feedback Awaiting maintainers feedback (via the GNATS Auto Assign Tool)
On Thursday 17 April 2008 21:40:09 Edwin Groothuis wrote: > Maintainer of net-im/openfire, > > Please note that PR ports/122867 has just been submitted. > > If it contains a patch for an upgrade, an enhancement or a bug fix > you agree on, reply to this email stating that you approve the patch > and a committer will take care of it. > > The full text of the PR can be found at: > http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/122867 Look good. But please incorporate also the last patch from here: http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/122741 -- ====================================================================== - Best regards, Nikolay Pavlov. <<<----------------------------------- ======================================================================
State Changed From-To: feedback->open Maintainer approved (but see message for suggestions).
State Changed From-To: open->closed Committed. Thanks!
miwi 2008-04-19 10:39:44 UTC FreeBSD ports repository Modified files: net-im/openfire Makefile distinfo pkg-plist Log: - Update to 3.5.0 PR: 122867 Submitted by: Nick Barkas <snb@threerings.net> Approved by: maintainer Revision Changes Path 1.18 +1 -2 ports/net-im/openfire/Makefile 1.12 +3 -3 ports/net-im/openfire/distinfo 1.8 +39 -0 ports/net-im/openfire/pkg-plist _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"