Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 18 Apr 2007 21:09:35 -0500
From:      Jeffrey Goldberg <jeffrey@goldmark.org>
To:        [LoN]Kamikaze <LoN_Kamikaze@gmx.de>
Cc:        ports@freebsd.org, David Southwell <david@vizion2000.net>
Subject:   Re: Lynx -vulnerabilities- is this permanent?
Message-ID:  <9EBEF2CA-F4FF-4BC3-9C20-1764C887DC2B@goldmark.org>
In-Reply-To: <46266687.1070400@gmx.de>
References:  <200704181057.34795.david@vizion2000.net> <46266687.1070400@gmx.de>

next in thread | previous in thread | raw e-mail | index | archive | help
On Apr 18, 2007, at 1:42 PM, [LoN]Kamikaze wrote:

> David Southwell wrote:
>> Hi
>>
>> portupgrade -a produces following output for lynx on cvsup from  
>> today.
>> freebsd 6.1
>> -----------------------------------------
>> --->  Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
>> --->  Building '/usr/ports/www/lynx'
>> ===>  Cleaning for lynx-2.8.6_4
>> ===>  lynx-2.8.6_4 has known vulnerabilities:
>> => lynx -- remote buffer overflow.
>>    Reference:
>> <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da- 
>> a1b8-000854d03344.html>
>> => Please update your ports tree and try again.
>> *** Error code 1
>>
>> Stop in /usr/ports/www/lynx.
>>
>> Any news or advice forthcoming?
>>
>> david
>
> Did you try a 'portaudit -F'?

I'm having the same problem as David, though I'm on 6.2.  Running

   portaudit -F

made no difference for  me.

-j

-- 
Jeffrey Goldberg                        http://www.goldmark.org/jeff/




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9EBEF2CA-F4FF-4BC3-9C20-1764C887DC2B>