Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 18 Apr 2007 20:42:15 +0200
From:      "[LoN]Kamikaze" <LoN_Kamikaze@gmx.de>
To:        David Southwell <david@vizion2000.net>
Cc:        ports@freebsd.org
Subject:   Re: Lynx -vulnerabilities- is this permanent?
Message-ID:  <46266687.1070400@gmx.de>
In-Reply-To: <200704181057.34795.david@vizion2000.net>
References:  <200704181057.34795.david@vizion2000.net>

next in thread | previous in thread | raw e-mail | index | archive | help
David Southwell wrote:
> Hi
> 
> portupgrade -a produces following output for lynx on cvsup from today.
> freebsd 6.1
> -----------------------------------------
> --->  Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
> --->  Building '/usr/ports/www/lynx'
> ===>  Cleaning for lynx-2.8.6_4
> ===>  lynx-2.8.6_4 has known vulnerabilities:
> => lynx -- remote buffer overflow.
>    Reference: 
> <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03344.html>;
> => Please update your ports tree and try again.
> *** Error code 1
> 
> Stop in /usr/ports/www/lynx.
> 
> Any news or advice forthcoming?
> 
> david

Did you try a 'portaudit -F'?



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?46266687.1070400>