Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Jun 2008 13:28:53 -0400
From:      Naram Qashat <cyberbotx@cyberbotx.com>
To:        Rene Ladan <r.c.ladan@gmail.com>
Cc:        gnome@freebsd.org, Jeremy Messenger <mezz7@cox.net>, ports@freebsd.org, marcuscom-devel@marcuscom.com
Subject:   Re: CALL FOR TEST: Updates to pixmap, cairo, poppler,	and firefox 3.0!
Message-ID:  <485BE8D5.60802@cyberbotx.com>
In-Reply-To: <e890cae60806200430i27a1b0c9wce0dcadeb41dfd9a@mail.gmail.com>
References:  <op.ucxiscyq9aq2h7@mezz.mezzweb.com> <e890cae60806200430i27a1b0c9wce0dcadeb41dfd9a@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Rene Ladan wrote:
> 2008/6/18 Jeremy Messenger <mezz7@cox.net>:
>> Hello folks,
>>
> [...]
>> x11/pixman: Update to 0.10.0
> [...]
>> graphics/cairo: Update to 1.6.4
> [...]
>> graphics/poppler: Update to 0.8.3
> [...]
>> www/firefox3: Update to 3.0 final
>>
> [...]
> 
> I saw this in the daily security check:
> 
>> Affected package: firefox-3.0_1,1
>> Type of problem: mozilla -- multiple vulnerabilities.
>> Reference: <http://www.FreeBSD.org/ports/portaudit/e190ca65-3636-11dc-a697-000c6ec775d9.html>;
> 
> Is this a false positive?  It seems to affect firefox >3.*,1 but the
> CVE entries say it is fixed in firefox 2.0.0.5
> 
> Rene

I got past that by adding DISABLE_VULNERABILITIES=yes to my build line.  I'm 
sure it probably is a false positive, though.  But at least it wasn't something 
that broke the build entirely.

Naram Qashat



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?485BE8D5.60802>