Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 19 Jan 2007 06:28:24 +0000
From:      Jase Thew <bazerka@beardz.net>
To:        Par Leijonhufvud <par@hunter-gatherer.org>
Cc:        freebsd-stable@freebsd.org
Subject:   Re: portdowngrade/portupgrade question
Message-ID:  <45B06508.5010105@beardz.net>
In-Reply-To: <20070119042501.GB91514@ojibwe.hunter-gatherer.org>
References:  <20070117052423.GC23307@ojibwe.hunter-gatherer.org>	<20070117075155.089ccb32.torfinn.ingolfsen@broadpark.no>	<20070118050044.GA827@ojibwe.hunter-gatherer.org>	<45AF8089.6030007@pp.nic.fi> <20070119042501.GB91514@ojibwe.hunter-gatherer.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Par Leijonhufvud wrote:
> Pertti Kosunen <pertti.kosunen@pp.nic.fi> [2007.01.18] wrote:
>>> What have I missed?
>> Update your ports tree, that version of fetchmail has vulnerabilities.
> 
> I know that. But fetching with fetchmail stopped working when I did that
> (when the new port came I did a portupgrade, forgot to kill & restart
> fetchmail, when I did so a day or so later it just dumped core), and
> I'm trying to pin down exactly what is going wrong. As part of that I
> want to try to go back to the old fetchmail and try it *fully knowing
> that it has vulnerabilities*.  Which appears to be either obscure,
> difficult or impossible. 
> 
> /Par
> 

portupgrade -f -m '-DDISABLE_VULNERABILITIES' fetchmail



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45B06508.5010105>