-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1085-1 security@debian.org http://www.debian.org/security/ Martin Schulze June 1st, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : lynx-ssl Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2004-1617 CAN-2005-3120 BugTraq ID : 11443 Debian Bug : 296340 Several vulnerabilities have been discoverd in lynx, the popular text-mode WWW browser. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities: CVE-2004-1617 Michal Zalewski discovered that lynx is not able to grok invalid HTML including a TEXTAREA tag with a large COLS value and a large tag name in an element that is not terminated, and loops forever trying to render the broken HTML. CAN-2005-3120 Ulf Härnhammar discovered a buffer overflow that can be remotely exploited. During the handling of Asian characters when connecting to an NNTP server lynx can be tricked to write past the boundary of a buffer which can lead to the execution of arbitrary code. For the old stable distribution (woody) these problems have been fixed in version 2.8.5-2.5woody1. For the stable distribution (sarge) these problems have been fixed in version 2.8.6-9sarge1. For the unstable distribution (sid) these problems will be fixed soon. We recommend that you upgrade your lynx-cur package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1.dsc Size/MD5 checksum: 640 e6f29a507e298508f72eb24c21b1bdde http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1.diff.gz Size/MD5 checksum: 634446 19fad72695b064d6a6e893bb1ea1006f http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5.orig.tar.gz Size/MD5 checksum: 2557113 81764528e685747ec00e7e23f18fd6d3 Architecture independent components: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur-wrapper_2.8.5-2.5woody1_all.deb Size/MD5 checksum: 161086 eec2317cf887d4d8762866c26b6783ad Alpha architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_alpha.deb Size/MD5 checksum: 1419168 50e1763a404316ec33802c77f55180ee ARM architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_arm.deb Size/MD5 checksum: 1292792 e922a7feefe43f2e0bff7713ed292403 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_i386.deb Size/MD5 checksum: 1252720 667586b0cb239a23efaa03a45e44ba41 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_ia64.deb Size/MD5 checksum: 1573108 88a04e9032f61055812cbbdc5b66ebcc HP Precision architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_hppa.deb Size/MD5 checksum: 1361852 2cf253de737b654ee1cce1b13b43639a Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_m68k.deb Size/MD5 checksum: 1212894 07b758555efaeff043595c2338dece95 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_mips.deb Size/MD5 checksum: 1314946 b737ed585f45a69a19f2f5314509918b Little endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_mipsel.deb Size/MD5 checksum: 1310968 a82a5f1be84d27067c9b63b8af540dd6 PowerPC architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_powerpc.deb Size/MD5 checksum: 1299254 a5498c2256c092e2a8ebef012df0f4b2 IBM S/390 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_s390.deb Size/MD5 checksum: 1271028 44125629519a455e212ae5397071e7bd Sun Sparc architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.5-2.5woody1_sparc.deb Size/MD5 checksum: 1297518 33c40521d500228c1973f4e67b424f40 Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1.dsc Size/MD5 checksum: 667 af1fc2fa2f7673145760fe57c0aea8fb http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1.diff.gz Size/MD5 checksum: 5605374 2deb21954ef7e8e39dfd26abdf1f2e64 http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6.orig.tar.gz Size/MD5 checksum: 3023366 02f47f32cb2b96ea5dc1bd335e19ef4a Architecture independent components: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur-wrapper_2.8.6-9sarge1_all.deb Size/MD5 checksum: 12296 a615ca6b426011b3f40cd20ad48cb2cb Alpha architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_alpha.deb Size/MD5 checksum: 2017328 ff45d271444be4f6560372dfb0b274b2 AMD64 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_amd64.deb Size/MD5 checksum: 1901508 bb17d7c45e77910289765aec3f77c30c ARM architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_arm.deb Size/MD5 checksum: 1871322 2555b982f070c91e00348370eaa48244 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_i386.deb Size/MD5 checksum: 1876050 4dd3066564cd0fc919bc326c51686f26 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_ia64.deb Size/MD5 checksum: 2155322 3736a40dd67ccba9a9f90e44f6a8ada7 HP Precision architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_hppa.deb Size/MD5 checksum: 1930998 6402a13b8834d92d2e01a306eb374d0f Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_m68k.deb Size/MD5 checksum: 1797494 01b7c40f1acfcc91c2ac467c867503e9 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_mips.deb Size/MD5 checksum: 1914628 87ae23a7369ea464d3840653ac1522b6 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_mipsel.deb Size/MD5 checksum: 1911160 8cff5b755921183a11062644001e0759 PowerPC architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_powerpc.deb Size/MD5 checksum: 1898106 e907c041632012ad322f3c701b6696cd IBM S/390 architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_s390.deb Size/MD5 checksum: 1886340 e2f640b6e388de70f160c6fe68dff134 Sun Sparc architecture: http://security.debian.org/pool/updates/main/l/lynx-cur/lynx-cur_2.8.6-9sarge1_sparc.deb Size/MD5 checksum: 1878152 f0a57a2d5ac589bec4e7994bc3ac2030 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEfqNFW5ql+IAeqTIRAnXuAJ9aDGFXrHE9FEAxKQH2PEdL+3DHPwCfe7vr v71WCmwy3QqWE0dZ+SGkJPM= =QziO -----END PGP SIGNATURE-----