Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 18 Apr 2007 10:57:34 -0700
From:      David Southwell <david@vizion2000.net>
To:        ports@freebsd.org
Subject:   Lynx -vulnerabilities- is this permanent?
Message-ID:  <200704181057.34795.david@vizion2000.net>

next in thread | raw e-mail | index | archive | help
Hi

portupgrade -a produces following output for lynx on cvsup from today.
freebsd 6.1
-----------------------------------------
--->  Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
--->  Building '/usr/ports/www/lynx'
===>  Cleaning for lynx-2.8.6_4
===>  lynx-2.8.6_4 has known vulnerabilities:
=> lynx -- remote buffer overflow.
   Reference: 
<http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03344.html>;
=> Please update your ports tree and try again.
*** Error code 1

Stop in /usr/ports/www/lynx.

Any news or advice forthcoming?

david




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200704181057.34795.david>