Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 22 Aug 2003 09:50:21 +0200 (CEST)
From:      Stefan Walter <sw@gegenunendlich.de>
To:        FreeBSD-gnats-submit@FreeBSD.org
Cc:        lioux@FreeBSD.org
Subject:   ports/55863: Mark net/xmule FORBIDDEN again
Message-ID:  <20030822075021.D5F3287E8@kyuzo.dunkelkammer.void>
Resent-Message-ID: <200308220800.h7M80W2A076878@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         55863
>Category:       ports
>Synopsis:       Mark net/xmule FORBIDDEN again
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Aug 22 01:00:31 PDT 2003
>Closed-Date:
>Last-Modified:
>Originator:     Stefan Walter
>Release:        FreeBSD 5.1-RELEASE i386
>Organization:
Infinity Approximation Task Force
>Environment:
System: FreeBSD kyuzo.dunkelkammer.void 5.1-RELEASE FreeBSD 5.1-RELEASE #0: Mon Aug 4 18:22:50 CEST 2003 root@kyuzo.dunkelkammer.void:/usr/obj/usr/src/sys/KYUZO i386
>Description:
The net/xmule port should be re-marked FORBIDDEN. According to a recent
security advisory [1], not all critical vulnerabilities have been fixed
in version 1.4.3.
The developers are aware of this and seem to have a fix in their CVS,
but don't seem to think of releasing a fixed version for download.

[1]: http://lists.netsys.com/pipermail/full-disclosure/2003-August/008449.html
>How-To-Repeat:
Install the port.
>Fix:
Mark port FORBIDDEN again.
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030822075021.D5F3287E8>