Date: Thu, 19 Apr 2007 03:33:59 -0700 From: David Southwell <david@vizion2000.net> To: ports@freebsd.org Subject: Re: Lynx -vulnerabilities- is this permanent? Message-ID: <200704190333.59728.david@vizion2000.net>
next in thread | raw e-mail | index | archive | help
---------- Forwarded Message ---------- Subject: Re: Lynx -vulnerabilities- is this permanent? Date: Thursday 19 April 2007 From: David Southwell <david@vizion2000.net> To: "[LoN]Kamikaze" <LoN_Kamikaze@gmx.de> On Wednesday 18 April 2007 11:42:15 you wrote: > David Southwell wrote: > > Hi > > > > portupgrade -a produces following output for lynx on cvsup from today. > > freebsd 6.1 > > ----------------------------------------- > > ---> Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx) > > ---> Building '/usr/ports/www/lynx' > > ===> Cleaning for lynx-2.8.6_4 > > ===> lynx-2.8.6_4 has known vulnerabilities: > > => lynx -- remote buffer overflow. > > Reference: > > <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03 > >344.html> => Please update your ports tree and try again. > > *** Error code 1 > > > > Stop in /usr/ports/www/lynx. > > > > Any news or advice forthcoming? > > > > david > > Did you try a 'portaudit -F'? Thanks - sorry to be slow getting back to you - have been out of town.. I tried portaudit -F before posting.. it made no difference Is it fixed yet?? david -------------------------------------------------------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200704190333.59728.david>