Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 7 Sep 2011 08:33:27 +0200 (CEST)
From:      linimon@FreeBSD.org
To:        ports@FreeBSD.org
Subject:   FreeBSD ports which are currently marked forbidden
Message-ID:  <201109070633.p876XRXv083785@koala.droso.net>

next in thread | raw e-mail | index | archive | help
As part of an ongoing effort to reduce the number of problems in the
FreeBSD ports system, we periodically notify users about
ports that are marked as "forbidden" in their Makefiles.  Often,
these ports are so marked due to security concerns, such as known
exploits.

An overview of each port, including errors seen on the build farm,
is included below.

portname:           databases/gnats
forbidden because:  Security issues
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=databases&portname=gnats


portname:           math/mupad
forbidden because:  Relies on xpm, vulnerable since 2004-09-15,
                    http://portaudit.freebsd.org/ef253f8b-0727-11d9-b45d-000c41e2cdad.html
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=math&portname=mupad


portname:           net-p2p/torrentflux
forbidden because:  Vulnerable since 2006-10-07,
                    http://portaudit.freebsd.org/72f21372-55e4-11db-a5ae-00508d6a62df.html
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=net-p2p&portname=torrentflux


portname:           net/tptest
forbidden because:  Vulnerable since 2009-12-17,
                    http://portaudit.freebsd.org/5486669e-ea9f-11de-bd9c-00215c6a37bb.html
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=net&portname=tptest


portname:           security/cfs
forbidden because:  Buffer overflows allow remote attackers to cause DoS /
                    execute arbitrary code
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=security&portname=cfs


portname:           security/pgp6
forbidden because:  Vulnerable since 2005-07-31,
                    http://portaudit.freebsd.org/8375a73f-01bf-11da-bc08-0001020eed82.html
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=security&portname=pgp6


portname:           sysutils/dtc
forbidden because:  Many security issues, see
                    http://bugs.freebsd.org/159736
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=sysutils&portname=dtc


portname:           www/plone
forbidden because:  Vulnerable since 2011-02-10,
                    http://portaudit.freebsd.org/7c492ea2-3566-11e0-8e81-0022190034c0.html
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=www&portname=plone


portname:           www/pyblosxom
forbidden because:  Vulnerable since 2009-02-11
                    http://portaudit.freebsd.org/b07f3254-f83a-11dd-85a4-ea653f0746ab.html
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=www&portname=pyblosxom


portname:           www/rt36
forbidden because:  Vulnerable since 2009-12-09,
                    http://portaudit.freebsd.org/714c1406-e4cf-11de-883a-003048590f9e.html
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=www&portname=rt36


portname:           www/seamonkey2
forbidden because:  several security vulnerabilities
build errors:       none.
overview:           http://portsmon.FreeBSD.org/portoverview.py?category=www&portname=seamonkey2



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201109070633.p876XRXv083785>