Date: Fri, 04 Jan 2002 03:35:15 +0900 From: Yoichi NAKAYAMA <yoichi@eken.phys.nagoya-u.ac.jp> To: Adam Kranzel <adam@blacktabby.org> Cc: ports@freebsd.org Subject: Re: net/radius port Message-ID: <wyg05nqo4c.wl@eken3.eken.phys.nagoya-u.ac.jp> In-Reply-To: <20020103101629.7305ded6.adam@blacktabby.org> References: <20020103101629.7305ded6.adam@blacktabby.org>
next in thread | previous in thread | raw e-mail | index | archive | help
At Thu, 3 Jan 2002 10:16:29 -0800, Adam Kranzel wrote: > The net/radius port is currently broken with a fetch error, however that > version (3.6.B1) has multiple exploitable buffer overflows. Should it be > marked as FORBIDDEN though it can't be fetched anyway? I think yes. In such case, it should prohibit installation even if one manually put the tar.gz to ports/distfiles/ > I am working on a patch to upgrade the port to 3.6.B2 which apparently > fixes the buffer overflows, however it may take a while. > Any ideas? > If consensus is that it should be marked as FORBIDDEN, I will send in a > patch. -- Yoichi Nakayama To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?wyg05nqo4c.wl>