From owner-freebsd-security Fri Jan 28 0: 7:59 2000 Delivered-To: freebsd-security@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 758) id 8E7BA15A67; Fri, 28 Jan 2000 00:07:52 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by hub.freebsd.org (Postfix) with ESMTP id 72D471CD5DC; Fri, 28 Jan 2000 00:07:52 -0800 (PST) (envelope-from kris@hub.freebsd.org) Date: Fri, 28 Jan 2000 00:07:52 -0800 (PST) From: Kris Kennaway To: "Sergey N. Voronkov" Cc: max@FreeBSD.org, freebsd-security@FreeBSD.org, freebsd-bugs@FreeBSD.org Subject: Re: delegate buffer overflow (ports) In-Reply-To: <200001280739.MAA02652@dor.zaural.ru> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Fri, 28 Jan 2000, Sergey N. Voronkov wrote: > And exploit for it: http://www.security.nnov.ru/1999/exploits/delefate.c > > Time to make port BROKEN ? Thanks for pointing it out..I'll look into this tomorrow and probably mark it FORBIDDEN (BROKEN won't be enough to stop the package building, since bento will try it anyway and notice it actually compiles :-) Kris ---- "How many roads must a man walk down, before you call him a man?" "Eight!" "That was a rhetorical question!" "Oh..then, seven!" -- Homer Simpson To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message