notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Current status

The server has been repaired, with a new power supply, for $23. I am waiting for lower COVID rates before visiting the datacenter to return it.
non port: mail/dspam/files/patch-src__client.c
SVNWeb

Number of commits found XX: 2

Sun, 1 May 2016
[ 21:07 junovitch ] Original commit   Revision:414426
414426 mail/dspam/files/patch-src__client.c
414426 mail/dspam/files/patch-src__daemon.c
mail/dspam: fix build; remove duplicate patch hunks in to files

PR:		209184
Submitted by:	Danny Warren <danny@dannywarren.com> (maintainer)
Pointy hat to:	junovitch
[ 01:13 junovitch ] Original commit   Revision:414374
414374 UPDATING
414374 mail/dspam/Makefile
414374 mail/dspam/files/UPDATING
414374 mail/dspam/files/dspam.in
414374 mail/dspam/files/patch-src__Makefile.in
414374 mail/dspam/files/patch-src__client.c
414374 mail/dspam/files/patch-src__daemon.c
414374 mail/dspam/files/patch-src__dspam.c
414374 mail/dspam/files/patch-src__dspam.conf.in
414374 mail/dspam/pkg-plist
mail/dspam: implement privilege separation (resolves bug running with suexec)

- Runs as dspam:dspam instead of root:mail. The dspam UID/GID were created
  in r168311 when the UIDs/GIDs files were added but the port had always
  used root:mail. This had prevented running the dspam webUI under Apache
  with suexec due to a minimal requirement of UID/GID of 100. The original
  unsecure behavior is available with the SETUID option.
- Default run directory is now /var/run/dspam. This follows the default
  upstream behavior and removes the patch to dspam.c as a result. Use
  RUN_DIR and correct the dspam.conf.sample file accordingly.
- Default daemon/client communication port is now 2424.
- Regen patches while here (portlint)

UPDATING: Document privilege separated dspam

PR:		115957
Reported by:	tedm@ipinc.net, support@ipinc.net
Submitted by:	Danny Warren <danny@dannywarren.com> (maintainer)

Number of commits found XX: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
vaultFeb 27
redisFeb 23
redis-develFeb 23
redis5Feb 23
zeekFeb 22
jenkinsFeb 20
raptor2Feb 20
asterisk13Feb 18
asterisk13Feb 18
asterisk13Feb 18
asterisk16Feb 18
asterisk16Feb 18
asterisk16Feb 18
asterisk16Feb 18
asterisk16Feb 18

13 vulnerabilities affecting 98 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2021-02-27 01:52:12


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 42653
Broken 75
Deprecated 170
Ignore 314
Forbidden 4
Restricted 139
No CDROM 71
Vulnerable 21
Expired 38
Set to expire 146
Interactive 0
new 24 hours 8
new 48 hours18
new 7 days65
new fortnight104
new month154

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2021 Dan Langille. All rights reserved.