Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Jun 2009 11:40:45 +0300
From:      "Sergey V. Dyatko" <sergey.dyatko@gmail.com>
To:        gesbbb@yahoo.com
Cc:        freebsd-ports@freebsd.org
Subject:   Re: next abort of perl upgrade encountered--linux-pango security problem :-(
Message-ID:  <20090625114045.495ffcae@notebook>
In-Reply-To: <20090625041206.2a154938@scorpio.seibercom.net>
References:  <200906250621.n5P6LJfC015754@mp.cs.niu.edu> <20090625093752.5719bb39@tiger.minsk.domain> <20090625041206.2a154938@scorpio.seibercom.net>

next in thread | previous in thread | raw e-mail | index | archive | help
В Thu, 25 Jun 2009 04:12:06 -0400
Jerry <gesbbb@yahoo.com> пишет:

J> On Thu, 25 Jun 2009 09:37:52 +0300
J> "Sergey V. Dyatko" <sergey.dyatko@gmail.com> wrote:
J> 
J> > 1) deinstall portaudit
J> > 2) upgrate all ports
J> > 3) install portaudit if you need it
J> > 
J> > or
J> > 
J> > 1)rm /var/db/portaudit/auditfile.tbz
J> > 2) upgrate all ports
J> > 3) portaudit -F
J> 
J> Way too much trouble and potentially dangerous.
I agree with you but Scott wrote "I'm not too worried about the
security bug for the moment". So it must works

J> Enter this in the /etc/make.conf file:
J> 
J> # Pango
J> ..if $(.CURDIR:M*/x11-toolkits/linux-pango)
J> DISABLE_VULNERABILITIES=yes
J> ..endif
yep, that is rightest way (IHMO)
J> 
J> This way, the DISABLE_VULNERABILITIES=yes will only effect one port.
J> 
J> 



--
---------------------------------------------------------------------------------------
Sergey V Dyatko  aka tiger   | Sergey.Dyatko@gmail.com
/"\   ASCII Ribbon Campaign  | FreeBSD Since 4.x
\ / - NO HTML/RTF in e-mail  | http://tiger.bsd.by
 X  - NO Word docs in e-mail | XMPP: tiger@jabber.org.by 
/ \  
---------------------------------------------------------------------------------------



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090625114045.495ffcae>