From owner-cvs-ports@FreeBSD.ORG Sat Dec 18 22:57:13 2004 Return-Path: Delivered-To: cvs-ports@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id AFE4F16A4CE; Sat, 18 Dec 2004 22:57:13 +0000 (GMT) Received: from randomservers.com (randomservers.com [69.55.237.158]) by mx1.FreeBSD.org (Postfix) with ESMTP id 8279343D2F; Sat, 18 Dec 2004 22:57:13 +0000 (GMT) (envelope-from joseph@randomnetworks.com) Received: from [192.168.1.253] (c-24-7-164-83.client.comcast.net [24.7.164.83]) (authenticated bits=0) by randomservers.com (8.12.10/8.12.6) with ESMTP id iBIMvBIY069432 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NO); Sat, 18 Dec 2004 14:57:11 -0800 (PST) (envelope-from joseph@randomnetworks.com) X-Authentication-Warning: randomservers.com: Host c-24-7-164-83.client.comcast.net [24.7.164.83] claimed to be [192.168.1.253] In-Reply-To: <200412182202.iBIM29BO086447@repoman.freebsd.org> References: <200412182202.iBIM29BO086447@repoman.freebsd.org> Mime-Version: 1.0 (Apple Message framework v619) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: <4AA5C0F7-5148-11D9-AB3F-000A95AD0296@randomnetworks.com> Content-Transfer-Encoding: 7bit From: Joseph Scott Date: Sat, 18 Dec 2004 14:58:11 -0800 To: Martin Blapp X-Mailer: Apple Mail (2.619) X-Spam-Status: No, hits=0.0 required=7.0 tests=none autolearn=no version=2.64 X-Spam-Checker-Version: SpamAssassin 2.64 (2004-01-11) on randomservers.com cc: cvs-ports@freebsd.org cc: cvs-all@freebsd.org cc: ports-committers@freebsd.org Subject: Re: cvs commit: ports/mail/up-imapproxy pkg-plist X-BeenThere: cvs-ports@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: CVS commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 18 Dec 2004 22:57:13 -0000 On Dec 18, 2004, at 2:02 PM, Martin Blapp wrote: > mbr 2004-12-18 22:02:09 UTC > > FreeBSD ports repository > > Modified files: > mail/up-imapproxy pkg-plist > Log: > Register the config file too, no only the sample config. Going over related PRs, have you looked at PR ports/74318? Mentions holes that can be used to crash this and includes patches. -- Joseph Scott http://joseph.randomnetworks.com/