Lynx -vulnerabilities- is this permanent?

Kris Kennaway kris at obsecurity.org
Thu Apr 19 03:49:08 UTC 2007


On Thu, Apr 19, 2007 at 10:10:41AM +0800, Foxfair Hu wrote:
> Lowell Gilbert wrote:
> > David Southwell <david at vizion2000.net> writes:
> > 
> >> portupgrade -a produces following output for lynx on cvsup from today.
> >> freebsd 6.1
> >> -----------------------------------------
> >> --->  Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
> >> --->  Building '/usr/ports/www/lynx'
> >> ===>  Cleaning for lynx-2.8.6_4
> >> ===>  lynx-2.8.6_4 has known vulnerabilities:
> >> => lynx -- remote buffer overflow.
> >>    Reference: 
> >> <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-a1b8-000854d03344.html>
> >> => Please update your ports tree and try again.
> >> *** Error code 1
> >>
> >> Stop in /usr/ports/www/lynx.
> >>
> >> Any news or advice forthcoming?
> > 
> > That doesn't *seem* to be applicable to the current version.
> > It looks like a version-number parsing problem producing a false warning.
> > I don't have access to my build machine to check more closely, though...
> > 
> > .
> > 
> 
> Definitely a false alert, lynx 2.8.5rel4 had fixed the problem, and it
> was rev1.112 of Makefile
> in www/lynx. If no one objects, I'll put this diff to prevent portaudit
> send wrong warning again:

Wrong fix, fix the vuxml instead of hacking around it.

Kris


More information about the freebsd-ports mailing list