Date: Wed, 10 Feb 2010 06:56:33 +1100 From: Peter Jeremy <peterjeremy@acm.org> To: Paul Pathiakis <pathiaki2@yahoo.com> Cc: ports@freebsd.org Subject: Re: linux-f10-pango security vulnerability Message-ID: <20100209195633.GA23709@server.vk2pj.dyndns.org> In-Reply-To: <443644.58125.qm@web110515.mail.gq1.yahoo.com> References: <443644.58125.qm@web110515.mail.gq1.yahoo.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--lrZ03NoBR/3+SXJZ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2010-Feb-08 18:05:43 -0800, Paul Pathiakis <pathiaki2@yahoo.com> wrote: >/usr/ports/x11-toolkits/linux-f10-pango still has a security >vulnerability and means that no one can build the linux port to >install linux-f10-flashplugin. Not good. Please fix asap. FreeBSD is maintained by volunteers. That sort of attitude will just annoy people. Feel free to fix it yourself. --=20 Peter Jeremy PS: Politely asking the port maintainer might get you somewhere. --lrZ03NoBR/3+SXJZ Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (FreeBSD) iEYEARECAAYFAktxvfEACgkQ/opHv/APuIclHACgovsjbT4787fPGdfVdakrllhL qMEAoIWhbf8BSxaNmMPQ6dfWiSghDrFD =wpaw -----END PGP SIGNATURE----- --lrZ03NoBR/3+SXJZ--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100209195633.GA23709>