Date: Mon, 22 Apr 2002 11:29:22 -0700 (PDT) From: David Bogen <db@bogen.org> To: freebsd-gnats-submit@freebsd.org Subject: ports/37346: sudo-1.6.5p3.patch has been pulled Message-ID: <200204221829.g3MITMk08214@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 37346 >Category: ports >Synopsis: sudo-1.6.5p3.patch has been pulled >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Apr 22 12:00:07 PDT 2002 >Closed-Date: >Last-Modified: >Originator: David Bogen >Release: 4.4-STABLE >Organization: >Environment: FreeBSD callisto.xxx.xxx 4.4-STABLE FreeBSD 4.4-STABLE #0: Tue Oct 2 18:45:13 PDT 2001 root@callisto.xxx.xxx:/usr/obj/usr/src/sys/CALLISTO i386 >Description: Trying to upgrade to latest sudo release fails because the patch fetched from globalintersec.com fails the checksum test. Examination of the patch file reveals its contents to be not a patch, but rather a note: $ cat sudo-1.6.5p3.patch Removed until embargo date (25/04/2002). Please email research@globalintersec.com reporting the location you sourced this URL from. If your cause is genuine we can, at your request provide the patch file previously located at this URL prior to the release date. >How-To-Repeat: Install ports. CVSup. cd /usr/ports/security/sudo make >Fix: Remove the patch requirement from the port and/or manually override the checksum on the port using NO_CHECKSUM=yes at compile time. >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200204221829.g3MITMk08214>