cvs commit: ports/security/vuxml vuln.xml

Peter Jeremy peterjeremy at optushome.com.au
Sat Sep 16 02:43:27 PDT 2006


On Thu, 2006-Sep-14 14:26:44 +0000, Remko Lodder wrote:
>remko       2006-09-14 14:26:44 UTC
>  Rewrite the win32-codecs entry to even better explain the vulnerability [2].

Since there's no longer a maintainer and there doesn't appear to be a
fix at the master site, this port may be broken for some time.  Is it
possible to just not install the QuickTime dll's?

Based on the codec breakdown, QuickTime support is the following files:
3ivX.qtx
ACTLComponent.qtx
AvidQTAVUICodec.qtx
BeHereiVideo.qtx
Indeo4.qtx
On2_VP3.qtx
ZyGoVideo.qtx
QuickTime.qts
QuickTimeEssentials.qtx
QuickTimeInternetExtras.qtx
qtmlClient.dll

Does anyone know if those files can just be removed to avoid the
vulnerability whilst still have the remaining win32 codecs work?

-- 
Peter Jeremy
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/cvs-all/attachments/20060916/a9794da3/attachment.pgp


More information about the cvs-all mailing list