Date: Mon, 22 Jan 2007 22:27:44 +0000 (UTC) From: Paul Schmehl <pauls@utdallas.edu> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/108224: security/sguil-sensor, patches improperly applied Message-ID: <20070122222744.48CD920581D@buttercup3.utdallas.edu> Resent-Message-ID: <200701222230.l0MMUGEN094154@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 108224 >Category: ports >Synopsis: security/sguil-sensor, patches improperly applied >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Mon Jan 22 22:30:16 GMT 2007 >Closed-Date: >Last-Modified: >Originator: Paul Schmehl >Release: FreeBSD 6.0-RELEASE-p15 amd64 >Organization: The University of Texas at Dallas >Environment: System: FreeBSD hostname.utdallas.edu 6.0-RELEASE-p15 FreeBSD 6.0-RELEASE-p15 #2: Mon Oct 16 21:28:21 UTC 2006 root@hostname.utdallas.edu:/usr/obj/usr/src/sys/SMPKERNEL amd64 >Description: The patch to the init script that I supplied was *supposed* to be applied to the script, *not* placed in ${FILESDIR}. Whoever committed the port improperly added the patch to the ${FILESDIR} instead of updating the sensor-agent.sh.in file in the ${FILESDIR}. >How-To-Repeat: >Fix: Apply the patch-sensor-agent.sh.in patch to the sensor-agent.sh.in file in the ${FILESDIR} and then commit the port. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070122222744.48CD920581D>