cvs commit: ports/security/vuxml vuln.xml
peterjeremy at optushome.com.au
Sat Sep 16 02:43:27 PDT 2006
On Thu, 2006-Sep-14 14:26:44 +0000, Remko Lodder wrote:
>remko 2006-09-14 14:26:44 UTC
> Rewrite the win32-codecs entry to even better explain the vulnerability .
Since there's no longer a maintainer and there doesn't appear to be a
fix at the master site, this port may be broken for some time. Is it
possible to just not install the QuickTime dll's?
Based on the codec breakdown, QuickTime support is the following files:
Does anyone know if those files can just be removed to avoid the
vulnerability whilst still have the remaining win32 codecs work?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/cvs-all/attachments/20060916/a9794da3/attachment.pgp
More information about the cvs-all