Date: Fri, 19 Jan 2007 06:28:24 +0000 From: Jase Thew <bazerka@beardz.net> To: Par Leijonhufvud <par@hunter-gatherer.org> Cc: freebsd-stable@freebsd.org Subject: Re: portdowngrade/portupgrade question Message-ID: <45B06508.5010105@beardz.net> In-Reply-To: <20070119042501.GB91514@ojibwe.hunter-gatherer.org> References: <20070117052423.GC23307@ojibwe.hunter-gatherer.org> <20070117075155.089ccb32.torfinn.ingolfsen@broadpark.no> <20070118050044.GA827@ojibwe.hunter-gatherer.org> <45AF8089.6030007@pp.nic.fi> <20070119042501.GB91514@ojibwe.hunter-gatherer.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Par Leijonhufvud wrote: > Pertti Kosunen <pertti.kosunen@pp.nic.fi> [2007.01.18] wrote: >>> What have I missed? >> Update your ports tree, that version of fetchmail has vulnerabilities. > > I know that. But fetching with fetchmail stopped working when I did that > (when the new port came I did a portupgrade, forgot to kill & restart > fetchmail, when I did so a day or so later it just dumped core), and > I'm trying to pin down exactly what is going wrong. As part of that I > want to try to go back to the old fetchmail and try it *fully knowing > that it has vulnerabilities*. Which appears to be either obscure, > difficult or impossible. > > /Par > portupgrade -f -m '-DDISABLE_VULNERABILITIES' fetchmail
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45B06508.5010105>