summaryrefslogtreecommitdiff
path: root/mail/popper
diff options
context:
space:
mode:
authorJoe Marcus Clarke <marcus@FreeBSD.org>2003-12-11 16:49:26 +0000
committerJoe Marcus Clarke <marcus@FreeBSD.org>2003-12-11 16:49:26 +0000
commitd831818e69a7073e71d508ea658eb3a8cb95c888 (patch)
tree609292081a1f4c3490682547ddc2b88c056b9f7c /mail/popper
parento Update to 4.1.1 alpha release. (diff)
With my portmgr hat on, mark this port FORBIDDEN as it contains a remotely
exploitable privilege escalation vulnerability. See http://www.eudora.com/qpopper/#BUFFER for more details. Reported by: kensmith
Notes
Notes: svn path=/head/; revision=95622
Diffstat (limited to 'mail/popper')
-rw-r--r--mail/popper/Makefile4
1 files changed, 4 insertions, 0 deletions
diff --git a/mail/popper/Makefile b/mail/popper/Makefile
index 504c347fcaae..bae23d257a72 100644
--- a/mail/popper/Makefile
+++ b/mail/popper/Makefile
@@ -16,6 +16,10 @@ EXTRACT_SUFX= .tar.Z
MAINTAINER= ache@freebsd.org
COMMENT= Berkeley POP 3 server (now maintained by Qualcomm)
+# See http://www.eudora.com/qpopper/#BUFFER for more details on this
+# vulnerability.
+FORBIDDEN= "Contains a privilege escalation vulnerability"
+
# Set WITH_POPPER_YOUBIN_SUPPORT variable in the environment to enable
# youbin support.
#