Date: Sat, 4 Jul 2009 14:26:18 GMT From: Shakir Solomon <freebsd@adamaix.co.za> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/136321: Please update linux based port of Pango Message-ID: <200907041426.n64EQIDl012032@www.freebsd.org> Resent-Message-ID: <200907041430.n64EU5vo001380@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 136321 >Category: ports >Synopsis: Please update linux based port of Pango >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Sat Jul 04 14:30:05 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Shakir Solomon >Release: FreeBSD 7.2-RELEASE-p1 >Organization: >Environment: FreeBSD amalia.adamaix.local 7.2-RELEASE-p1 FreeBSD 7.2-RELEASE-p1 #0: Sun Jun 21 20:06:40 SAST 2009 root@amalia.adamaix.local:/usr/obj/usr/src/sys/AMALIA i386 >Description: pango -- integer overflow. Reference: <http://portaudit.FreeBSD.org/4b172278-3f46-11de-becb-001cc0377035.html> Affected ports: linux-pango-1.10.2_3 linux-f8-pango-1.18.4_1 linux-f10-pango-1.22.3 Release of Pango with the vulnerability fixed is pango-1.24.4 >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200907041426.n64EQIDl012032>