diff options
author | marcus <marcus@FreeBSD.org> | 2003-12-12 00:49:26 +0800 |
---|---|---|
committer | marcus <marcus@FreeBSD.org> | 2003-12-12 00:49:26 +0800 |
commit | 4c64c1dcf8756eaa0048369345badc9a32353b38 (patch) | |
tree | be7e0020b26b4df3d3f8cd9d00ec8c7eb3e80d2e /mail/popper | |
parent | fc3ebe3cf46ec15e03e90e3ee8f6ed91843f2e35 (diff) | |
download | freebsd-ports-gnome-4c64c1dcf8756eaa0048369345badc9a32353b38.tar.gz freebsd-ports-gnome-4c64c1dcf8756eaa0048369345badc9a32353b38.tar.zst freebsd-ports-gnome-4c64c1dcf8756eaa0048369345badc9a32353b38.zip |
With my portmgr hat on, mark this port FORBIDDEN as it contains a remotely
exploitable privilege escalation vulnerability. See
http://www.eudora.com/qpopper/#BUFFER for more details.
Reported by: kensmith
Diffstat (limited to 'mail/popper')
-rw-r--r-- | mail/popper/Makefile | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/mail/popper/Makefile b/mail/popper/Makefile index 504c347fcaae..bae23d257a72 100644 --- a/mail/popper/Makefile +++ b/mail/popper/Makefile @@ -16,6 +16,10 @@ EXTRACT_SUFX= .tar.Z MAINTAINER= ache@freebsd.org COMMENT= Berkeley POP 3 server (now maintained by Qualcomm) +# See http://www.eudora.com/qpopper/#BUFFER for more details on this +# vulnerability. +FORBIDDEN= "Contains a privilege escalation vulnerability" + # Set WITH_POPPER_YOUBIN_SUPPORT variable in the environment to enable # youbin support. # |