Date: Wed, 18 Apr 2007 21:09:35 -0500 From: Jeffrey Goldberg <jeffrey@goldmark.org> To: [LoN]Kamikaze <LoN_Kamikaze@gmx.de> Cc: ports@freebsd.org, David Southwell <david@vizion2000.net> Subject: Re: Lynx -vulnerabilities- is this permanent? Message-ID: <9EBEF2CA-F4FF-4BC3-9C20-1764C887DC2B@goldmark.org> In-Reply-To: <46266687.1070400@gmx.de> References: <200704181057.34795.david@vizion2000.net> <46266687.1070400@gmx.de>
next in thread | previous in thread | raw e-mail | index | archive | help
On Apr 18, 2007, at 1:42 PM, [LoN]Kamikaze wrote: > David Southwell wrote: >> Hi >> >> portupgrade -a produces following output for lynx on cvsup from >> today. >> freebsd 6.1 >> ----------------------------------------- >> ---> Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx) >> ---> Building '/usr/ports/www/lynx' >> ===> Cleaning for lynx-2.8.6_4 >> ===> lynx-2.8.6_4 has known vulnerabilities: >> => lynx -- remote buffer overflow. >> Reference: >> <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da- >> a1b8-000854d03344.html> >> => Please update your ports tree and try again. >> *** Error code 1 >> >> Stop in /usr/ports/www/lynx. >> >> Any news or advice forthcoming? >> >> david > > Did you try a 'portaudit -F'? I'm having the same problem as David, though I'm on 6.2. Running portaudit -F made no difference for me. -j -- Jeffrey Goldberg http://www.goldmark.org/jeff/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9EBEF2CA-F4FF-4BC3-9C20-1764C887DC2B>