Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 19 Feb 2002 14:15:54 -0500 (EST)
From:      Garrett Wollman <wollman@lcs.mit.edu>
To:        "Scott Pell" <spell@apid.com>
Cc:        <ports@FreeBSD.org>
Subject:   FreeBSD Port: freeradius-devel-20010310
Message-ID:  <200202191915.g1JJFsH98821@khavrinen.lcs.mit.edu>
In-Reply-To: <003001c1b987$9dcb6280$e46ca241@matrix>
References:  <003001c1b987$9dcb6280$e46ca241@matrix>

next in thread | previous in thread | raw e-mail | index | archive | help
<<On Tue, 19 Feb 2002 12:54:26 -0800, "Scott Pell" <spell@apid.com> said:

> Trying update and install this port...getting the following:
> ===>  freeradius-devel-20010310 is forbidden: Remotely exploitable
> buffer overflow.

> Any recommendations on how to get this port installed?

Don't.  When I (or anyone else, for that matter) get a
sufficiently-large Round Tuit, the port will be replaced with one for
a released version of FreeRADIUS which doesn't have the security hole.

-GAWollman


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200202191915.g1JJFsH98821>