From owner-freebsd-emulation@FreeBSD.ORG Wed Feb 10 01:03:45 2010 Return-Path: Delivered-To: freebsd-emulation@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BD2A51065670 for ; Wed, 10 Feb 2010 01:03:45 +0000 (UTC) (envelope-from jared99.009@gmail.com) Received: from mail-pz0-f202.google.com (mail-pz0-f202.google.com [209.85.222.202]) by mx1.freebsd.org (Postfix) with ESMTP id 95AC38FC1D for ; Wed, 10 Feb 2010 01:03:45 +0000 (UTC) Received: by pzk40 with SMTP id 40so9164229pzk.7 for ; Tue, 09 Feb 2010 17:03:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=8H5lfZ6NDYkwfDzULbQprFCgjB/F5yCzUOuimQeop90=; b=bDNAQDIeeM1Uy7Zrz4v+Kkef5oLnxWKm8YgY0z1V7F6N26JiQeTXPklktsO98g4dLy //aH3g5GeJ+/KnVyp44YT11IDSG+7h1CHTGikr86SJNHdBYA9zIojaRxCM56JYQ9dlHq 0KwbQYeUbGbK60BzBBh7mSk2GcM9amD+Ss0GI= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=RbQtfThcbaKkoeW1q/NVSprXentuuyhL+yD6Rn/gY6i2fi9AMHug8XShFY5QeCMWXT Q9/Y1GQnswyAdHd9x0tIa0Wl7QkyVQr8eZLBkqZ1hX/mJlgXLwwKp8iUjf3vhQgXSxjz afope6kd4rlL4WAycdZyLsUwmBhvZcSKychEc= MIME-Version: 1.0 Received: by 10.115.61.13 with SMTP id o13mr5163429wak.28.1265762105028; Tue, 09 Feb 2010 16:35:05 -0800 (PST) Date: Tue, 9 Feb 2010 14:35:04 -1000 Message-ID: <7ca256961002091635v79b1403se627d2fb0731587f@mail.gmail.com> From: Jar D To: freebsd-emulation@FreeBSD.org Content-Type: text/plain; charset=ISO-8859-1 X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: Subject: linux-f10-pango-1.22.3 has known vulnerabilities. X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 10 Feb 2010 01:03:45 -0000 ===> linux-f10-pango-1.22.3 has known vulnerabilities: => pango -- integer overflow. Reference: < http://portaudit.FreeBSD.org/4b172278-3f46-11de-becb-001cc0377035.html> => Please update your ports tree and try again. http://forums.freebsd.org/showthread.php?p=64633#post64633 It was apparently fixed in 1.24 but port is forever staying at 1.22.