Linux Security
Linux Security
Linux Security

Debian: New lynx-cur packages fix several vulnerabilities

Date 01 Jun 2006
5845
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1085-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                             Martin Schulze
June 1st, 2006                          https://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : lynx-ssl
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2004-1617 CAN-2005-3120
BugTraq ID     : 11443
Debian Bug     : 296340


Several vulnerabilities have been discoverd in lynx, the popular
text-mode WWW browser.  The Common Vulnerabilities and Exposures
Project identifies the following vulnerabilities:

CVE-2004-1617

    Michal Zalewski discovered that lynx is not able to grok invalid
    HTML including a TEXTAREA tag with a large COLS value and a large
    tag name in an element that is not terminated, and loops forever
    trying to render the broken HTML.

CAN-2005-3120

    Ulf H�rnhammar discovered a buffer overflow that can be remotely
    exploited. During the handling of Asian characters when connecting
    to an NNTP server lynx can be tricked to write past the boundary
    of a buffer which can lead to the execution of arbitrary code.

For the old stable distribution (woody) these problems have been fixed in
version 2.8.5-2.5woody1.

For the stable distribution (sarge) these problems have been fixed in
version 2.8.6-9sarge1.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your lynx-cur package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1.dsc
      Size/MD5 checksum:      640 e6f29a507e298508f72eb24c21b1bdde
    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1.diff.gz
      Size/MD5 checksum:   634446 19fad72695b064d6a6e893bb1ea1006f
    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5.orig.tar.gz
      Size/MD5 checksum:  2557113 81764528e685747ec00e7e23f18fd6d3

  Architecture independent components:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur-wrapper_2.8.5-2.5woody1_all.deb
      Size/MD5 checksum:   161086 eec2317cf887d4d8762866c26b6783ad

  Alpha architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_alpha.deb
      Size/MD5 checksum:  1419168 50e1763a404316ec33802c77f55180ee

  ARM architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_arm.deb
      Size/MD5 checksum:  1292792 e922a7feefe43f2e0bff7713ed292403

  Intel IA-32 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_i386.deb
      Size/MD5 checksum:  1252720 667586b0cb239a23efaa03a45e44ba41

  Intel IA-64 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_ia64.deb
      Size/MD5 checksum:  1573108 88a04e9032f61055812cbbdc5b66ebcc

  HP Precision architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_hppa.deb
      Size/MD5 checksum:  1361852 2cf253de737b654ee1cce1b13b43639a

  Motorola 680x0 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_m68k.deb
      Size/MD5 checksum:  1212894 07b758555efaeff043595c2338dece95

  Big endian MIPS architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_mips.deb
      Size/MD5 checksum:  1314946 b737ed585f45a69a19f2f5314509918b

  Little endian MIPS architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_mipsel.deb
      Size/MD5 checksum:  1310968 a82a5f1be84d27067c9b63b8af540dd6

  PowerPC architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_powerpc.deb
      Size/MD5 checksum:  1299254 a5498c2256c092e2a8ebef012df0f4b2

  IBM S/390 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_s390.deb
      Size/MD5 checksum:  1271028 44125629519a455e212ae5397071e7bd

  Sun Sparc architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_sparc.deb
      Size/MD5 checksum:  1297518 33c40521d500228c1973f4e67b424f40


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1.dsc
      Size/MD5 checksum:      667 af1fc2fa2f7673145760fe57c0aea8fb
    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1.diff.gz
      Size/MD5 checksum:  5605374 2deb21954ef7e8e39dfd26abdf1f2e64
    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6.orig.tar.gz
      Size/MD5 checksum:  3023366 02f47f32cb2b96ea5dc1bd335e19ef4a

  Architecture independent components:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur-wrapper_2.8.6-9sarge1_all.deb
      Size/MD5 checksum:    12296 a615ca6b426011b3f40cd20ad48cb2cb

  Alpha architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_alpha.deb
      Size/MD5 checksum:  2017328 ff45d271444be4f6560372dfb0b274b2

  AMD64 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_amd64.deb
      Size/MD5 checksum:  1901508 bb17d7c45e77910289765aec3f77c30c

  ARM architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_arm.deb
      Size/MD5 checksum:  1871322 2555b982f070c91e00348370eaa48244

  Intel IA-32 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_i386.deb
      Size/MD5 checksum:  1876050 4dd3066564cd0fc919bc326c51686f26

  Intel IA-64 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_ia64.deb
      Size/MD5 checksum:  2155322 3736a40dd67ccba9a9f90e44f6a8ada7

  HP Precision architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_hppa.deb
      Size/MD5 checksum:  1930998 6402a13b8834d92d2e01a306eb374d0f

  Motorola 680x0 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_m68k.deb
      Size/MD5 checksum:  1797494 01b7c40f1acfcc91c2ac467c867503e9

  Big endian MIPS architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_mips.deb
      Size/MD5 checksum:  1914628 87ae23a7369ea464d3840653ac1522b6

  Little endian MIPS architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_mipsel.deb
      Size/MD5 checksum:  1911160 8cff5b755921183a11062644001e0759

  PowerPC architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_powerpc.deb
      Size/MD5 checksum:  1898106 e907c041632012ad322f3c701b6696cd

  IBM S/390 architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_s390.deb
      Size/MD5 checksum:  1886340 e2f640b6e388de70f160c6fe68dff134

  Sun Sparc architecture:

    https://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_sparc.deb
      Size/MD5 checksum:  1878152 f0a57a2d5ac589bec4e7994bc3ac2030


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.