On Oct 17 11:02, Yaakov S (Cygwin Ports) wrote:
Lynx contains a buffer overflow that may be exploited to execute
arbitrary code. (CAN-2005-3120)
Solution: lynx-2.8.5 needs to be patched (URL below).
http://security.gentoo.org/glsa/glsa-200510-15.xml
Sorry, I cannot provide an update/nor fix until 25 of October.
I'm on holidays until then.
On 10/17/05, Yaakov S (Cygwin Ports) [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Clam AntiVirus is subject to vulnerabilities ranging from Denial of
Service to execution of arbitrary code
Op Tue, 18 Oct 2005 01:35:12 -0400 (EDT) schreef Igor Pechtchanski
in [EMAIL PROTECTED]:
: On Tue, 18 Oct 2005, Buzz wrote:
: Op Sun, 16 Oct 2005 17:30:34 -0400 (EDT) schreef Igor Pechtchanski:
[Mirror manually added or stale.]
: : You are assuming that the format of the last-mirror file is
It looks like sunrpc may have a bad setup.hint somewhere
in the system.
In the latest setup.ini (where I noticed this), I see:
@ sunrpc
sdesc: A wrapper for stat(2) and statfs(2).
ldesc: A wrapper for stat(2) and statfs(2).
category: Utils
requires: cygwin
... which seems a bit odd.