Date: Tue, 19 Feb 2002 14:15:54 -0500 (EST) From: Garrett Wollman <wollman@lcs.mit.edu> To: "Scott Pell" <spell@apid.com> Cc: <ports@FreeBSD.org> Subject: FreeBSD Port: freeradius-devel-20010310 Message-ID: <200202191915.g1JJFsH98821@khavrinen.lcs.mit.edu> In-Reply-To: <003001c1b987$9dcb6280$e46ca241@matrix> References: <003001c1b987$9dcb6280$e46ca241@matrix>
next in thread | previous in thread | raw e-mail | index | archive | help
<<On Tue, 19 Feb 2002 12:54:26 -0800, "Scott Pell" <spell@apid.com> said: > Trying update and install this port...getting the following: > ===> freeradius-devel-20010310 is forbidden: Remotely exploitable > buffer overflow. > Any recommendations on how to get this port installed? Don't. When I (or anyone else, for that matter) get a sufficiently-large Round Tuit, the port will be replaced with one for a released version of FreeRADIUS which doesn't have the security hole. -GAWollman To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200202191915.g1JJFsH98821>