From owner-freebsd-ports@FreeBSD.ORG Wed Sep 7 06:33:24 2011 Return-Path: Delivered-To: ports@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1809910656D6 for ; Wed, 7 Sep 2011 06:33:24 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from koala.droso.net (koala.droso.net [IPv6:2001:6c8:130:400::6]) by mx1.freebsd.org (Postfix) with ESMTP id 950CA8FC13 for ; Wed, 7 Sep 2011 06:33:23 +0000 (UTC) Received: from koala.droso.net (localhost.droso.net [127.0.0.1]) by koala.droso.net (8.14.4/8.14.4) with ESMTP id p876XMNH083548 for ; Wed, 7 Sep 2011 08:33:22 +0200 (CEST) (envelope-from linimon@FreeBSD.org) Date: Wed, 7 Sep 2011 08:33:22 +0200 (CEST) Message-Id: <201109070633.p876XMNH083548@koala.droso.net> From: linimon@FreeBSD.org To: ports@FreeBSD.org Cc: Subject: FreeBSD unmaintained ports which are currently marked forbidden X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: portmgr-feedback@FreeBSD.org List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Sep 2011 06:33:24 -0000 As part of an ongoing effort to reduce the number of problems in the FreeBSD ports system, we periodically notify users about ports that are marked as "forbidden" in their Makefiles. Often, these ports are so marked due to security concerns, such as known exploits. An overview of each port, including errors seen on the build farm, is included below. portname: math/mupad forbidden because: Relies on xpm, vulnerable since 2004-09-15, http://portaudit.freebsd.org/ef253f8b-0727-11d9-b45d-000c41e2cdad.html build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=math&portname=mupad portname: net-p2p/torrentflux forbidden because: Vulnerable since 2006-10-07, http://portaudit.freebsd.org/72f21372-55e4-11db-a5ae-00508d6a62df.html build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=net-p2p&portname=torrentflux portname: net/tptest forbidden because: Vulnerable since 2009-12-17, http://portaudit.freebsd.org/5486669e-ea9f-11de-bd9c-00215c6a37bb.html build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=net&portname=tptest portname: security/cfs forbidden because: Buffer overflows allow remote attackers to cause DoS / execute arbitrary code build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=security&portname=cfs portname: security/pgp6 forbidden because: Vulnerable since 2005-07-31, http://portaudit.freebsd.org/8375a73f-01bf-11da-bc08-0001020eed82.html build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=security&portname=pgp6 portname: www/plone forbidden because: Vulnerable since 2011-02-10, http://portaudit.freebsd.org/7c492ea2-3566-11e0-8e81-0022190034c0.html build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=www&portname=plone portname: www/rt36 forbidden because: Vulnerable since 2009-12-09, http://portaudit.freebsd.org/714c1406-e4cf-11de-883a-003048590f9e.html build errors: none. overview: http://portsmon.FreeBSD.org/portoverview.py?category=www&portname=rt36