Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Feb 2010 06:56:33 +1100
From:      Peter Jeremy <peterjeremy@acm.org>
To:        Paul Pathiakis <pathiaki2@yahoo.com>
Cc:        ports@freebsd.org
Subject:   Re: linux-f10-pango security vulnerability
Message-ID:  <20100209195633.GA23709@server.vk2pj.dyndns.org>
In-Reply-To: <443644.58125.qm@web110515.mail.gq1.yahoo.com>
References:  <443644.58125.qm@web110515.mail.gq1.yahoo.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--lrZ03NoBR/3+SXJZ
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On 2010-Feb-08 18:05:43 -0800, Paul Pathiakis <pathiaki2@yahoo.com> wrote:
>/usr/ports/x11-toolkits/linux-f10-pango still has a security
>vulnerability and means that no one can build the linux port to
>install linux-f10-flashplugin.  Not good.  Please fix asap.

FreeBSD is maintained by volunteers.  That sort of attitude will just
annoy people.  Feel free to fix it yourself.

--=20
Peter Jeremy

PS: Politely asking the port maintainer might get you somewhere.

--lrZ03NoBR/3+SXJZ
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (FreeBSD)

iEYEARECAAYFAktxvfEACgkQ/opHv/APuIclHACgovsjbT4787fPGdfVdakrllhL
qMEAoIWhbf8BSxaNmMPQ6dfWiSghDrFD
=wpaw
-----END PGP SIGNATURE-----

--lrZ03NoBR/3+SXJZ--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100209195633.GA23709>