Date: Fri, 20 Jun 2008 12:35:34 -0500 From: "Jeremy Messenger" <mezz7@cox.net> To: "Naram Qashat" <cyberbotx@cyberbotx.com> Cc: gnome@freebsd.org, Rene Ladan <r.c.ladan@gmail.com> Subject: Re: CALL FOR TEST: Updates to pixmap, cairo, poppler, and firefox 3.0! Message-ID: <op.uc15tkc29aq2h7@mezz.mezzweb.com> In-Reply-To: <485BE8D5.60802@cyberbotx.com> References: <op.ucxiscyq9aq2h7@mezz.mezzweb.com> <e890cae60806200430i27a1b0c9wce0dcadeb41dfd9a@mail.gmail.com> <485BE8D5.60802@cyberbotx.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 20 Jun 2008 12:28:53 -0500, Naram Qashat <cyberbotx@cyberbotx.com> wrote: > Rene Ladan wrote: >> 2008/6/18 Jeremy Messenger <mezz7@cox.net>: >>> Hello folks, >>> >> [...] >>> x11/pixman: Update to 0.10.0 >> [...] >>> graphics/cairo: Update to 1.6.4 >> [...] >>> graphics/poppler: Update to 0.8.3 >> [...] >>> www/firefox3: Update to 3.0 final >>> >> [...] >> I saw this in the daily security check: >> >>> Affected package: firefox-3.0_1,1 >>> Type of problem: mozilla -- multiple vulnerabilities. >>> Reference: >>> <http://www.FreeBSD.org/ports/portaudit/e190ca65-3636-11dc-a697-000c6ec775d9.html> >> Is this a false positive? It seems to affect firefox >3.*,1 but the >> CVE entries say it is fixed in firefox 2.0.0.5 >> Rene > > I got past that by adding DISABLE_VULNERABILITIES=yes to my build line. > I'm sure it probably is a false positive, though. But at least it > wasn't something that broke the build entirely. Yes, it's false. I will fix vuxml/vuln.xml in this afternoon. Cheers, Mezz > Naram Qashat -- mezz7@cox.net - mezz@FreeBSD.org FreeBSD GNOME Team http://www.FreeBSD.org/gnome/ - gnome@FreeBSD.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.uc15tkc29aq2h7>