Lynx -vulnerabilities- is this permanent?

David Southwell david at vizion2000.net
Thu Apr 19 10:22:25 UTC 2007


----------  Forwarded Message  ----------

Subject: Re: Lynx -vulnerabilities- is this permanent?
Date: Thursday 19 April 2007
From: David Southwell <david at vizion2000.net>
To: "[LoN]Kamikaze" <LoN_Kamikaze at gmx.de>

On Wednesday 18 April 2007 11:42:15 you wrote:
> David Southwell wrote:
> > Hi
> >
> > portupgrade -a produces following output for lynx on cvsup from today.
> > freebsd 6.1
> > -----------------------------------------
> > --->  Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
> > --->  Building '/usr/ports/www/lynx'
> > ===>  Cleaning for lynx-2.8.6_4
> > ===>  lynx-2.8.6_4 has known vulnerabilities:
> > => lynx -- remote buffer overflow.
> >    Reference:
> > <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03
> >344.html> => Please update your ports tree and try again.
> > *** Error code 1
> >
> > Stop in /usr/ports/www/lynx.
> >
> > Any news or advice forthcoming?
> >
> > david
>
> Did you try a 'portaudit -F'?

Thanks - sorry to be slow getting back to you - have been out of town..
I tried portaudit -F before posting.. it made no difference

Is it fixed yet??

david

-------------------------------------------------------


More information about the freebsd-ports mailing list