Date: Fri, 22 Aug 2003 09:50:21 +0200 (CEST) From: Stefan Walter <sw@gegenunendlich.de> To: FreeBSD-gnats-submit@FreeBSD.org Cc: lioux@FreeBSD.org Subject: ports/55863: Mark net/xmule FORBIDDEN again Message-ID: <20030822075021.D5F3287E8@kyuzo.dunkelkammer.void> Resent-Message-ID: <200308220800.h7M80W2A076878@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 55863 >Category: ports >Synopsis: Mark net/xmule FORBIDDEN again >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Aug 22 01:00:31 PDT 2003 >Closed-Date: >Last-Modified: >Originator: Stefan Walter >Release: FreeBSD 5.1-RELEASE i386 >Organization: Infinity Approximation Task Force >Environment: System: FreeBSD kyuzo.dunkelkammer.void 5.1-RELEASE FreeBSD 5.1-RELEASE #0: Mon Aug 4 18:22:50 CEST 2003 root@kyuzo.dunkelkammer.void:/usr/obj/usr/src/sys/KYUZO i386 >Description: The net/xmule port should be re-marked FORBIDDEN. According to a recent security advisory [1], not all critical vulnerabilities have been fixed in version 1.4.3. The developers are aware of this and seem to have a fix in their CVS, but don't seem to think of releasing a fixed version for download. [1]: http://lists.netsys.com/pipermail/full-disclosure/2003-August/008449.html >How-To-Repeat: Install the port. >Fix: Mark port FORBIDDEN again. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030822075021.D5F3287E8>