Your message dated Mon, 17 Oct 2005 17:02:12 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#334423: fixed in lynx-cur 2.8.6-16
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 17 Oct 2005 19:52:53 +0000
>From [EMAIL PROTECTED] Mon Oct 17 12:52:53 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.enyo.de [212.9.189.167] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1ERb2T-00033f-00; Mon, 17 Oct 2005 12:52:53 -0700
Received: from deneb.vpn.enyo.de ([212.9.189.177] helo=deneb.enyo.de)
        by albireo.enyo.de with esmtp id 1ERb2S-0007MK-P2
        for [EMAIL PROTECTED]; Mon, 17 Oct 2005 21:52:52 +0200
Received: from fw by deneb.enyo.de with local (Exim 4.54)
        id 1ERb1N-0004Vq-U2
        for [EMAIL PROTECTED]; Mon, 17 Oct 2005 21:51:45 +0200
From: Florian Weimer <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [CAN-2005-3120] buffer overflow in nntp schema handling
Date: Mon, 17 Oct 2005 21:51:45 +0200
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: lynx, lynx-cur
Severity: grave
Tags: security

Various vendors have reported a remotely exploitable buffer overflow
vulnerability in Lynx.

From: Martin Pitt <[EMAIL PROTECTED]>
Subject: [USN-206-1] Lynx vulnerability
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Date: Mon, 17 Oct 2005 11:40:48 +0200
Message-ID: <[EMAIL PROTECTED]>

===========================================================
Ubuntu Security Notice USN-206-1           October 17, 2005
lynx vulnerability
CAN-2005-3120
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

lynx

The problem can be corrected by upgrading the affected package to
version 2.8.5-1ubuntu1.1 (for Ubuntu 4.10), 2.8.5-2ubuntu0.5.04 (for
Ubuntu 5.04), or 2.8.5-2ubuntu0.5.10 (for Ubuntu 5.10).  In general, a
standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Ulf Harnhammar discovered a remote vulnerability in Lynx when
connecting to a news server (NNTP). The function that added missing
escape chararacters to article headers did not check the size of the
target buffer. Specially crafted news entries could trigger a buffer
overflow, which could be exploited to execute arbitrary code with the
privileges of the user running lynx. In order to exploit this, the
user is not even required to actively visit a news site with Lynx
since a malicious HTML page could automatically redirect to an nntp://
URL with malicious news items.

[...]

---------------------------------------
Received: (at 334423-close) by bugs.debian.org; 18 Oct 2005 00:08:02 +0000
>From [EMAIL PROTECTED] Mon Oct 17 17:08:02 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1ERevk-0005cI-00; Mon, 17 Oct 2005 17:02:12 -0700
From: Atsuhito KOHDA <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#334423: fixed in lynx-cur 2.8.6-16
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 17 Oct 2005 17:02:12 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: lynx-cur
Source-Version: 2.8.6-16

We believe that the bug you reported is fixed in the latest version of
lynx-cur, which is due to be installed in the Debian FTP archive:

lynx-cur-wrapper_2.8.6-16_all.deb
  to pool/main/l/lynx-cur/lynx-cur-wrapper_2.8.6-16_all.deb
lynx-cur_2.8.6-16.diff.gz
  to pool/main/l/lynx-cur/lynx-cur_2.8.6-16.diff.gz
lynx-cur_2.8.6-16.dsc
  to pool/main/l/lynx-cur/lynx-cur_2.8.6-16.dsc
lynx-cur_2.8.6-16_i386.deb
  to pool/main/l/lynx-cur/lynx-cur_2.8.6-16_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Atsuhito KOHDA <[EMAIL PROTECTED]> (supplier of updated lynx-cur package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 18 Oct 2005 08:27:39 +0900
Source: lynx-cur
Binary: lynx-cur-wrapper lynx-cur
Architecture: source i386 all
Version: 2.8.6-16
Distribution: unstable
Urgency: low
Maintainer: Atsuhito KOHDA <[EMAIL PROTECTED]>
Changed-By: Atsuhito KOHDA <[EMAIL PROTECTED]>
Description: 
 lynx-cur   - Text-mode WWW Browser with NLS support (development version)
 lynx-cur-wrapper - Wrapper for lynx-cur
Closes: 332360 334423
Changes: 
 lynx-cur (2.8.6-16) unstable; urgency=low
 .
   * This is of 2.8.6dev.13 (closes: #334423)
    - eliminate fixed-size buffers in LYExpandHostForURL() to guard against
      buffer overflow resulting from too-long domain prefix/suffix data from
      lynx.cfg (report by Ulf Harnhammar, CAN-2005-3120) -TD
   * Added Swedish translation for debconf messages.  Thanks to Daniel Nylander
     <[EMAIL PROTECTED]>  (closes: #332360)
Files: 
 cc15d5371eaa348a7e0a059b1204ef09 655 web extra lynx-cur_2.8.6-16.dsc
 c0c93f835d5e5ce7c5c61456e75c7ed9 2915036 web extra lynx-cur_2.8.6-16.diff.gz
 912e3ebf7d843acde5391445dcaf4b7b 12576 web extra 
lynx-cur-wrapper_2.8.6-16_all.deb
 8aad50332ed262b08c2604b273e3a20f 1924174 web extra lynx-cur_2.8.6-16_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDVDYN1IXdL1v6kOwRAn7NAJsE9yAzYrD5pPqzOq9NUuWZQbeNgACeN8T7
fuSh1dWQOoHU3S9TBvHM1S8=
=SAz1
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to