Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Jun 2008 12:35:34 -0500
From:      "Jeremy Messenger" <mezz7@cox.net>
To:        "Naram Qashat" <cyberbotx@cyberbotx.com>
Cc:        gnome@freebsd.org, Rene Ladan <r.c.ladan@gmail.com>
Subject:   Re: CALL FOR TEST: Updates to pixmap, cairo, poppler,	and firefox 3.0!
Message-ID:  <op.uc15tkc29aq2h7@mezz.mezzweb.com>
In-Reply-To: <485BE8D5.60802@cyberbotx.com>
References:  <op.ucxiscyq9aq2h7@mezz.mezzweb.com> <e890cae60806200430i27a1b0c9wce0dcadeb41dfd9a@mail.gmail.com> <485BE8D5.60802@cyberbotx.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 20 Jun 2008 12:28:53 -0500, Naram Qashat <cyberbotx@cyberbotx.com>  
wrote:

> Rene Ladan wrote:
>> 2008/6/18 Jeremy Messenger <mezz7@cox.net>:
>>> Hello folks,
>>>
>> [...]
>>> x11/pixman: Update to 0.10.0
>> [...]
>>> graphics/cairo: Update to 1.6.4
>> [...]
>>> graphics/poppler: Update to 0.8.3
>> [...]
>>> www/firefox3: Update to 3.0 final
>>>
>> [...]
>>  I saw this in the daily security check:
>>
>>> Affected package: firefox-3.0_1,1
>>> Type of problem: mozilla -- multiple vulnerabilities.
>>> Reference:  
>>> <http://www.FreeBSD.org/ports/portaudit/e190ca65-3636-11dc-a697-000c6ec775d9.html>;
>>  Is this a false positive?  It seems to affect firefox >3.*,1 but the
>> CVE entries say it is fixed in firefox 2.0.0.5
>>  Rene
>
> I got past that by adding DISABLE_VULNERABILITIES=yes to my build line.   
> I'm sure it probably is a false positive, though.  But at least it  
> wasn't something that broke the build entirely.

Yes, it's false. I will fix vuxml/vuln.xml in this afternoon.

Cheers,
Mezz

> Naram Qashat


-- 
mezz7@cox.net  -  mezz@FreeBSD.org
FreeBSD GNOME Team
http://www.FreeBSD.org/gnome/  -  gnome@FreeBSD.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.uc15tkc29aq2h7>