Date: Wed, 18 Apr 2007 10:57:34 -0700 From: David Southwell <david@vizion2000.net> To: ports@freebsd.org Subject: Lynx -vulnerabilities- is this permanent? Message-ID: <200704181057.34795.david@vizion2000.net>
next in thread | raw e-mail | index | archive | help
Hi portupgrade -a produces following output for lynx on cvsup from today. freebsd 6.1 ----------------------------------------- ---> Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx) ---> Building '/usr/ports/www/lynx' ===> Cleaning for lynx-2.8.6_4 ===> lynx-2.8.6_4 has known vulnerabilities: => lynx -- remote buffer overflow. Reference: <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03344.html> => Please update your ports tree and try again. *** Error code 1 Stop in /usr/ports/www/lynx. Any news or advice forthcoming? david
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200704181057.34795.david>