Date: Wed, 17 Jun 2009 15:53:59 -0400 From: Jerry <gesbbb@yahoo.com> To: freebsd-questions@freebsd.org Subject: Re: Updating linux-pango Message-ID: <20090617155359.50ca717a@scorpio.seibercom.net> In-Reply-To: <01023496@ipt.ru> References: <20090617061933.33878200@scorpio.seibercom.net> <01023496@ipt.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 17 Jun 2009 21:11:51 +0400 Boris Samorodov <bsam@ipt.ru> wrote: > Gerard <gesbbb@yahoo.com> writes: > > > Affected package: linux-pango-1.10.2_3 > > Type of problem: pango -- integer overflow. > > Reference: > > <http://www.FreeBSD.org/ports/portaudit/4b172278-3f46-11de-becb-001cc0377035.html> > > > > This problem has existed for awhile now. Unless: > > > > DISABLE_VULNERABILITIES=yes > > > > is used, linux-pango and any port that depends on it will refuse to > > build. Is there any information on when this problem will be > > resolved? I really do not like intentionally installing a program > > with a potential security problem; however, in this case I have no > > choice. > > Usually a search at archieves of FreeBSD maillists may be helpful: > http://lists.freebsd.org/pipermail/freebsd-questions/2009-June/200565.html > > > WBR That does not supply an answer. -- Jerry gesbbb@yahoo.com What I want is all of the power and none of the responsibility.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090617155359.50ca717a>