Date: Sat, 16 Sep 2006 17:40:43 +0200 From: Remko Lodder <remko@FreeBSD.org> To: Peter Jeremy <peterjeremy@optushome.com.au> Cc: cvs-ports@freebsd.org, cvs-all@freebsd.org, ports-committers@freebsd.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml Message-ID: <450C1AFB.1000204@FreeBSD.org> In-Reply-To: <20060916094324.GA11675@turion.vk2pj.dyndns.org> References: <200609141426.k8EEQiVC003730@repoman.freebsd.org> <20060916094324.GA11675@turion.vk2pj.dyndns.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Peter Jeremy wrote:
> On Thu, 2006-Sep-14 14:26:44 +0000, Remko Lodder wrote:
>> remko 2006-09-14 14:26:44 UTC
>> Rewrite the win32-codecs entry to even better explain the vulnerability [2].
>
> Since there's no longer a maintainer and there doesn't appear to be a
> fix at the master site, this port may be broken for some time. Is it
> possible to just not install the QuickTime dll's?
>
> Based on the codec breakdown, QuickTime support is the following files:
> 3ivX.qtx
> ACTLComponent.qtx
> AvidQTAVUICodec.qtx
> BeHereiVideo.qtx
> Indeo4.qtx
> On2_VP3.qtx
> ZyGoVideo.qtx
> QuickTime.qts
> QuickTimeEssentials.qtx
> QuickTimeInternetExtras.qtx
> qtmlClient.dll
>
> Does anyone know if those files can just be removed to avoid the
> vulnerability whilst still have the remaining win32 codecs work?
>
Hello Peter,
I am not sure, and I am not going to look into it as we speak
(Not that I do not want, but I am planning to go on holiday
in a few hours, so need to do other things instead and make sure
most of my open items are known etc).
I will have a look when I get back if no one looked prior to that.
Cheers,
Remko
--
Kind regards,
Remko Lodder ** remko@elvandar.org
FreeBSD ** remko@FreeBSD.org
/* Quis custodiet ipsos custodes */
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?450C1AFB.1000204>
