Date: Fri, 20 Jun 2008 13:28:53 -0400 From: Naram Qashat <cyberbotx@cyberbotx.com> To: Rene Ladan <r.c.ladan@gmail.com> Cc: gnome@freebsd.org, Jeremy Messenger <mezz7@cox.net>, ports@freebsd.org, marcuscom-devel@marcuscom.com Subject: Re: CALL FOR TEST: Updates to pixmap, cairo, poppler, and firefox 3.0! Message-ID: <485BE8D5.60802@cyberbotx.com> In-Reply-To: <e890cae60806200430i27a1b0c9wce0dcadeb41dfd9a@mail.gmail.com> References: <op.ucxiscyq9aq2h7@mezz.mezzweb.com> <e890cae60806200430i27a1b0c9wce0dcadeb41dfd9a@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Rene Ladan wrote: > 2008/6/18 Jeremy Messenger <mezz7@cox.net>: >> Hello folks, >> > [...] >> x11/pixman: Update to 0.10.0 > [...] >> graphics/cairo: Update to 1.6.4 > [...] >> graphics/poppler: Update to 0.8.3 > [...] >> www/firefox3: Update to 3.0 final >> > [...] > > I saw this in the daily security check: > >> Affected package: firefox-3.0_1,1 >> Type of problem: mozilla -- multiple vulnerabilities. >> Reference: <http://www.FreeBSD.org/ports/portaudit/e190ca65-3636-11dc-a697-000c6ec775d9.html> > > Is this a false positive? It seems to affect firefox >3.*,1 but the > CVE entries say it is fixed in firefox 2.0.0.5 > > Rene I got past that by adding DISABLE_VULNERABILITIES=yes to my build line. I'm sure it probably is a false positive, though. But at least it wasn't something that broke the build entirely. Naram Qashat
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?485BE8D5.60802>