From owner-freebsd-ports@FreeBSD.ORG Wed Apr 18 18:32:08 2007 Return-Path: X-Original-To: ports@freebsd.org Delivered-To: freebsd-ports@FreeBSD.ORG Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 0A7CF16A401 for ; Wed, 18 Apr 2007 18:32:08 +0000 (UTC) (envelope-from freebsd-ports-local@be-well.ilk.org) Received: from mail2.sea5.speakeasy.net (mail2.sea5.speakeasy.net [69.17.117.4]) by mx1.freebsd.org (Postfix) with ESMTP id DB02A13C4D0 for ; Wed, 18 Apr 2007 18:32:07 +0000 (UTC) (envelope-from freebsd-ports-local@be-well.ilk.org) Received: (qmail 15023 invoked from network); 18 Apr 2007 18:32:06 -0000 Received: from dsl092-078-145.bos1.dsl.speakeasy.net (HELO be-well.ilk.org) ([66.92.78.145]) (envelope-sender ) by mail2.sea5.speakeasy.net (qmail-ldap-1.03) with SMTP for ; 18 Apr 2007 18:32:06 -0000 Received: by be-well.ilk.org (Postfix, from userid 1147) id 3BDAE28434; Wed, 18 Apr 2007 14:32:06 -0400 (EDT) To: David Southwell References: <200704181057.34795.david@vizion2000.net> From: Lowell Gilbert Date: Wed, 18 Apr 2007 14:32:05 -0400 In-Reply-To: <200704181057.34795.david@vizion2000.net> (David Southwell's message of "Wed\, 18 Apr 2007 10\:57\:34 -0700") Message-ID: <44wt09ilei.fsf@be-well.ilk.org> User-Agent: Gnus/5.11 (Gnus v5.11) Emacs/22.0.97 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: ports@freebsd.org, jharris@widomaker.com, foxfair@freebsd.org Subject: Re: Lynx -vulnerabilities- is this permanent? X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Apr 2007 18:32:08 -0000 David Southwell writes: > portupgrade -a produces following output for lynx on cvsup from today. > freebsd 6.1 > ----------------------------------------- > ---> Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx) > ---> Building '/usr/ports/www/lynx' > ===> Cleaning for lynx-2.8.6_4 > ===> lynx-2.8.6_4 has known vulnerabilities: > => lynx -- remote buffer overflow. > Reference: > > => Please update your ports tree and try again. > *** Error code 1 > > Stop in /usr/ports/www/lynx. > > Any news or advice forthcoming? That doesn't *seem* to be applicable to the current version. It looks like a version-number parsing problem producing a false warning. I don't have access to my build machine to check more closely, though...