aboutsummaryrefslogtreecommitdiff
path: root/games/gtetrinet
diff options
context:
space:
mode:
authorJacques Vidrine <nectar@FreeBSD.org>2002-11-04 14:32:27 +0000
committerJacques Vidrine <nectar@FreeBSD.org>2002-11-04 14:32:27 +0000
commit6d465722414e1773a6d458762aad66870be49e04 (patch)
treedff2e2b89b0880014bfa3e0e1129e46abcef80b4 /games/gtetrinet
parentccb41b37163033e5742f5d4b5ccefb57de8e810c (diff)
downloadports-6d465722414e1773a6d458762aad66870be49e04.tar.gz
ports-6d465722414e1773a6d458762aad66870be49e04.zip
Mark FORBIDDEN.
Distribution web site sez, ``October 27, 2002 GTetrinet 0.4.4 has been released, and you should upgrade RIGHT AWAY. Steve Kemp and James Antill discovered several grave security problems in previous versions of GTetrinet, which are remotely exploitable if you connected to a malicious tetrinet server. The new version hopefully fixes all of these buffer overflows, so it's the only recommended version right now. -- Jordi '' Reported by: Niels Heinen <niels.heinen@ubizen.com>
Notes
Notes: svn path=/head/; revision=69453
Diffstat (limited to 'games/gtetrinet')
-rw-r--r--games/gtetrinet/Makefile2
1 files changed, 2 insertions, 0 deletions
diff --git a/games/gtetrinet/Makefile b/games/gtetrinet/Makefile
index 5dccc8912ed5..92c6f1603fff 100644
--- a/games/gtetrinet/Makefile
+++ b/games/gtetrinet/Makefile
@@ -12,6 +12,8 @@ MASTER_SITE_SUBDIR= gtetrinet
MAINTAINER= bugg@bugg.strangled.net
+FORBIDDEN= "Remotely exploitable buffer overflows. See GTetrinet web site."
+
USE_X_PREFIX= yes
USE_GMAKE= yes
USE_GNOME= yes