Date: Sun, 7 Apr 2013 08:30:37 GMT From: linimon@FreeBSD.org To: ports@FreeBSD.org Subject: FreeBSD ports which are currently marked forbidden Message-ID: <201304070830.r378UbPH095330@portsmonj.FreeBSD.org>
next in thread | raw e-mail | index | archive | help
As part of an ongoing effort to reduce the number of problems in the FreeBSD ports system, we periodically notify users about ports that are marked as "forbidden" in their Makefiles. Often, these ports are so marked due to security concerns, such as known exploits. An overview of each port, including errors seen on the build farm, is included below. portname: graphics/linux-tiff forbidden because: Vulnerable since 2004-10-13, http://portaudit.freebsd.org/8816bf3a-7929-11df-bcce-0018f3e2eb82.html build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=graphics&portname=linux-tiff portname: security/sudosh3 forbidden because: Secunia Advisory SA38292, ISS X-Force sudosh-replay-bo (55903), replay() function buffer overflow. build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=security&portname=sudosh3 portname: www/linux-flashplugin9 forbidden because: CVE-2010-1297 build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=www&portname=linux-flashplugin9 portname: x11-toolkits/linux-pango forbidden because: Vulnerable since 2009-05-13, http://portaudit.freebsd.org/4b172278-3f46-11de-becb-001cc0377035.html build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=x11-toolkits&portname=linux-pango
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201304070830.r378UbPH095330>