aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2002-11-04 22:32:27 +0800
committernectar <nectar@FreeBSD.org>2002-11-04 22:32:27 +0800
commitbc0d378804cca9cc444782699f4ca75131b0579e (patch)
tree52c8e700f49c8f8cb0f86f8601aebfceec2b3f1d
parent2039418c2e9a70f001318ed14013f6d4a53fdb42 (diff)
downloadfreebsd-ports-gnome-bc0d378804cca9cc444782699f4ca75131b0579e.tar.gz
freebsd-ports-gnome-bc0d378804cca9cc444782699f4ca75131b0579e.tar.zst
freebsd-ports-gnome-bc0d378804cca9cc444782699f4ca75131b0579e.zip
Mark FORBIDDEN.
Distribution web site sez, ``October 27, 2002 GTetrinet 0.4.4 has been released, and you should upgrade RIGHT AWAY. Steve Kemp and James Antill discovered several grave security problems in previous versions of GTetrinet, which are remotely exploitable if you connected to a malicious tetrinet server. The new version hopefully fixes all of these buffer overflows, so it's the only recommended version right now. -- Jordi '' Reported by: Niels Heinen <niels.heinen@ubizen.com>
-rw-r--r--games/gtetrinet/Makefile2
1 files changed, 2 insertions, 0 deletions
diff --git a/games/gtetrinet/Makefile b/games/gtetrinet/Makefile
index 5dccc8912ed5..92c6f1603fff 100644
--- a/games/gtetrinet/Makefile
+++ b/games/gtetrinet/Makefile
@@ -12,6 +12,8 @@ MASTER_SITE_SUBDIR= gtetrinet
MAINTAINER= bugg@bugg.strangled.net
+FORBIDDEN= "Remotely exploitable buffer overflows. See GTetrinet web site."
+
USE_X_PREFIX= yes
USE_GMAKE= yes
USE_GNOME= yes