Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Apr 2007 03:33:59 -0700
From:      David Southwell <david@vizion2000.net>
To:        ports@freebsd.org
Subject:   Re: Lynx -vulnerabilities- is this permanent?
Message-ID:  <200704190333.59728.david@vizion2000.net>

next in thread | raw e-mail | index | archive | help

----------  Forwarded Message  ----------

Subject: Re: Lynx -vulnerabilities- is this permanent?
Date: Thursday 19 April 2007
From: David Southwell <david@vizion2000.net>
To: "[LoN]Kamikaze" <LoN_Kamikaze@gmx.de>

On Wednesday 18 April 2007 11:42:15 you wrote:
> David Southwell wrote:
> > Hi
> >
> > portupgrade -a produces following output for lynx on cvsup from today.
> > freebsd 6.1
> > -----------------------------------------
> > --->  Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
> > --->  Building '/usr/ports/www/lynx'
> > ===>  Cleaning for lynx-2.8.6_4
> > ===>  lynx-2.8.6_4 has known vulnerabilities:
> > => lynx -- remote buffer overflow.
> >    Reference:
> > <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03
> >344.html> => Please update your ports tree and try again.
> > *** Error code 1
> >
> > Stop in /usr/ports/www/lynx.
> >
> > Any news or advice forthcoming?
> >
> > david
>
> Did you try a 'portaudit -F'?

Thanks - sorry to be slow getting back to you - have been out of town..
I tried portaudit -F before posting.. it made no difference

Is it fixed yet??

david

-------------------------------------------------------



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200704190333.59728.david>