diff options
author | Joe Marcus Clarke <marcus@FreeBSD.org> | 2003-12-11 16:49:26 +0000 |
---|---|---|
committer | Joe Marcus Clarke <marcus@FreeBSD.org> | 2003-12-11 16:49:26 +0000 |
commit | d831818e69a7073e71d508ea658eb3a8cb95c888 (patch) | |
tree | 609292081a1f4c3490682547ddc2b88c056b9f7c /mail/popper | |
parent | o Update to 4.1.1 alpha release. (diff) |
With my portmgr hat on, mark this port FORBIDDEN as it contains a remotely
exploitable privilege escalation vulnerability. See
http://www.eudora.com/qpopper/#BUFFER for more details.
Reported by: kensmith
Notes
Notes:
svn path=/head/; revision=95622
Diffstat (limited to 'mail/popper')
-rw-r--r-- | mail/popper/Makefile | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/mail/popper/Makefile b/mail/popper/Makefile index 504c347fcaae..bae23d257a72 100644 --- a/mail/popper/Makefile +++ b/mail/popper/Makefile @@ -16,6 +16,10 @@ EXTRACT_SUFX= .tar.Z MAINTAINER= ache@freebsd.org COMMENT= Berkeley POP 3 server (now maintained by Qualcomm) +# See http://www.eudora.com/qpopper/#BUFFER for more details on this +# vulnerability. +FORBIDDEN= "Contains a privilege escalation vulnerability" + # Set WITH_POPPER_YOUBIN_SUPPORT variable in the environment to enable # youbin support. # |