Date: Wed, 18 Apr 2007 14:32:05 -0400 From: Lowell Gilbert <freebsd-ports-local@be-well.ilk.org> To: David Southwell <david@vizion2000.net> Cc: ports@freebsd.org, jharris@widomaker.com, foxfair@freebsd.org Subject: Re: Lynx -vulnerabilities- is this permanent? Message-ID: <44wt09ilei.fsf@be-well.ilk.org> In-Reply-To: <200704181057.34795.david@vizion2000.net> (David Southwell's message of "Wed\, 18 Apr 2007 10\:57\:34 -0700") References: <200704181057.34795.david@vizion2000.net>
next in thread | previous in thread | raw e-mail | index | archive | help
David Southwell <david@vizion2000.net> writes: > portupgrade -a produces following output for lynx on cvsup from today. > freebsd 6.1 > ----------------------------------------- > ---> Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx) > ---> Building '/usr/ports/www/lynx' > ===> Cleaning for lynx-2.8.6_4 > ===> lynx-2.8.6_4 has known vulnerabilities: > => lynx -- remote buffer overflow. > Reference: > <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03344.html> > => Please update your ports tree and try again. > *** Error code 1 > > Stop in /usr/ports/www/lynx. > > Any news or advice forthcoming? That doesn't *seem* to be applicable to the current version. It looks like a version-number parsing problem producing a false warning. I don't have access to my build machine to check more closely, though...
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44wt09ilei.fsf>