From owner-freebsd-ports@FreeBSD.ORG Mon Oct 9 17:29:57 2006 Return-Path: X-Original-To: ports@freebsd.org Delivered-To: freebsd-ports@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D9BD916A412 for ; Mon, 9 Oct 2006 17:29:57 +0000 (UTC) (envelope-from jacardenasm@gmail.com) Received: from nf-out-0910.google.com (nf-out-0910.google.com [64.233.182.186]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7693243D81 for ; Mon, 9 Oct 2006 17:29:54 +0000 (GMT) (envelope-from jacardenasm@gmail.com) Received: by nf-out-0910.google.com with SMTP id n15so5828nfc for ; Mon, 09 Oct 2006 10:29:53 -0700 (PDT) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=stvoqt4awi+IsZsDpuZG9itppsASwwJ4PJIbLTnnEhCBAydLl0CfTNyKOxNxLYXsO91MLEYsXjblHtpbLAFEs5n0NrH1aqLoUwMXNFEetEn7yv9Svowv8kDngizev72vXhWkbY5uALZeKzJnoE9RgZ3mT4EUFhl8V5MuRMzmwx4= Received: by 10.49.8.4 with SMTP id l4mr56104nfi; Mon, 09 Oct 2006 10:29:53 -0700 (PDT) Received: by 10.49.78.11 with HTTP; Mon, 9 Oct 2006 10:29:53 -0700 (PDT) Message-ID: <7c58fcfc0610091029l686b46cfvbe78c39bd31f5274@mail.gmail.com> Date: Mon, 9 Oct 2006 12:29:53 -0500 From: "Jose Alonso Cardenas Marquez" To: "Mark Foster" , ports@freebsd.org In-Reply-To: <452A6F69.4010202@foster.cc> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <452A6F69.4010202@foster.cc> Cc: Subject: Re: python 2.4 X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Oct 2006 17:29:57 -0000 2006/10/9, Mark Foster : > So is python-2.4.3_2 (just committed) STILL vulnerable? It won't let me > upgrade from python-2.4.3 > > # make > ===> python-2.4.3 has known vulnerabilities: > => python -- buffer overrun in repr() for unicode strings. > Reference: > > => Please update your ports tree and try again. > *** Error code 1 > > Stop in /usr/ports/lang/python. > The lang/python port was updated, please update your port tree and try again. you don't forget to read of ports/UPDATING note. Greetings ACM