Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Jun 2009 15:53:59 -0400
From:      Jerry <gesbbb@yahoo.com>
To:        freebsd-questions@freebsd.org
Subject:   Re: Updating linux-pango
Message-ID:  <20090617155359.50ca717a@scorpio.seibercom.net>
In-Reply-To: <01023496@ipt.ru>
References:  <20090617061933.33878200@scorpio.seibercom.net> <01023496@ipt.ru>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 17 Jun 2009 21:11:51 +0400
Boris Samorodov <bsam@ipt.ru> wrote:

> Gerard <gesbbb@yahoo.com> writes:
> 
> > Affected package: linux-pango-1.10.2_3
> > Type of problem: pango -- integer overflow.
> > Reference:
> > <http://www.FreeBSD.org/ports/portaudit/4b172278-3f46-11de-becb-001cc0377035.html>;
> >
> > This problem has existed for awhile now. Unless: 
> >
> > 	DISABLE_VULNERABILITIES=yes
> >
> > is used, linux-pango and any port that depends on it will refuse to
> > build. Is there any information on when this problem will be
> > resolved? I really do not like intentionally installing a program
> > with a potential security problem; however, in this case I have no
> > choice.
> 
> Usually a search at archieves of FreeBSD maillists may be helpful:
> http://lists.freebsd.org/pipermail/freebsd-questions/2009-June/200565.html
> 
> 
> WBR

That does not supply an answer.

-- 
Jerry
gesbbb@yahoo.com

What I want is all of the power and none of the responsibility.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090617155359.50ca717a>