Lynx -vulnerabilities- is this permanent?

Lowell Gilbert freebsd-ports-local at be-well.ilk.org
Wed Apr 18 18:32:08 UTC 2007


David Southwell <david at vizion2000.net> writes:

> portupgrade -a produces following output for lynx on cvsup from today.
> freebsd 6.1
> -----------------------------------------
> --->  Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
> --->  Building '/usr/ports/www/lynx'
> ===>  Cleaning for lynx-2.8.6_4
> ===>  lynx-2.8.6_4 has known vulnerabilities:
> => lynx -- remote buffer overflow.
>    Reference: 
> <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03344.html>
> => Please update your ports tree and try again.
> *** Error code 1
>
> Stop in /usr/ports/www/lynx.
>
> Any news or advice forthcoming?

That doesn't *seem* to be applicable to the current version.
It looks like a version-number parsing problem producing a false warning.
I don't have access to my build machine to check more closely, though...


More information about the freebsd-ports mailing list