From owner-freebsd-security Thu Dec 2 12:21:45 1999 Delivered-To: freebsd-security@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 758) id 190F714C17; Thu, 2 Dec 1999 12:21:44 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by hub.freebsd.org (Postfix) with ESMTP id 0652A1CD417; Thu, 2 Dec 1999 12:21:43 -0800 (PST) (envelope-from kris@hub.freebsd.org) Date: Thu, 2 Dec 1999 12:21:43 -0800 (PST) From: Kris Kennaway To: Steve Reid Cc: Sheldon Hearn , Bill Swingle , security@FreeBSD.ORG, Jordan Hubbard Subject: Re: [btellier@USA.NET: Several FreeBSD-3.3 vulnerabilities] In-Reply-To: <19991202032121.A7470@grok.localnet> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, 2 Dec 1999, Steve Reid wrote: > Some time ago I found a root exploit in a third-party package installed > via ports. I wasn't sure if it was freebsd-specific so I emailed the > port maintainer and the people originally responsible for the software. What is the port? I will look at it. Quite often the ports maintainers don't do their job, at which point you should take it to someone else (i.e. another committer, who is allowed to go in and fix the problem himself if the maintainer is being unresponsive). Kris To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message