Skip to navigation

Security Advisory Important: lynx security update

Advisory: RHSA-2008:0965-9
Type: Security Advisory
Severity: Important
Issued on: 2008-10-27
Last updated on: 2008-10-27
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.7.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.7.z)
Red Hat Enterprise Linux EUS (v. 5.2.z server)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2006-7234
CVE-2008-4690

Details

An updated lynx package that corrects two security issues is now available
for Red Hat Enterprise Linux 2.1, 3, 4, and 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Lynx is a text-based Web browser.

An arbitrary command execution flaw was found in the Lynx "lynxcgi:" URI
handler. An attacker could create a web page redirecting to a malicious URL
that could execute arbitrary code as the user running Lynx in the
non-default "Advanced" user mode. (CVE-2008-4690)

Note: In these updated lynx packages, Lynx will always prompt users before
loading a "lynxcgi:" URI. Additionally, the default lynx.cfg configuration
file now marks all "lynxcgi:" URIs as untrusted by default.

A flaw was found in a way Lynx handled ".mailcap" and ".mime.types"
configuration files. Files in the browser's current working directory were
opened before those in the user's home directory. A local attacker, able to
convince a user to run Lynx in a directory under their control, could
possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)

All users of Lynx are advised to upgrade to this updated package, which
contains backported patches correcting these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
lynx-2.8.5-11.3.src.rpm     MD5: 04c3ac939554382ddbb4673604c63feb
 
IA-32:
lynx-2.8.5-11.3.i386.rpm     MD5: 70c1a5bdd685d81cfb3247a6979f7465
 
x86_64:
lynx-2.8.5-11.3.x86_64.rpm     MD5: 475a53b660d5d8e6b4d614aa24d583b3
 
Red Hat Desktop (v. 4)

SRPMS:
lynx-2.8.5-18.2.el4_7.1.src.rpm     MD5: 4178afb380ee08ebf180fe0edc7746c0
 
IA-32:
lynx-2.8.5-18.2.el4_7.1.i386.rpm     MD5: 1d5b908561c5ed4963da5e4462fbcb61
 
x86_64:
lynx-2.8.5-18.2.el4_7.1.x86_64.rpm     MD5: d48e0bb4873d7770e9aa6aa40e91f0c6
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
lynx-2.8.5-28.1.el5_2.1.src.rpm     MD5: 50361cc8e52c87a49e9258250715aca9
 
IA-32:
lynx-2.8.5-28.1.el5_2.1.i386.rpm     MD5: 3883ef2cf36918afd0647adf24ec5bd0
 
IA-64:
lynx-2.8.5-28.1.el5_2.1.ia64.rpm     MD5: e6cf88eb488fba2d3b872a76502cc609
 
PPC:
lynx-2.8.5-28.1.el5_2.1.ppc.rpm     MD5: bee1e1394cb7f81de8cd9e9a1a0585d9
 
s390x:
lynx-2.8.5-28.1.el5_2.1.s390x.rpm     MD5: faa86319283b5b78a668fe961c9a70f3
 
x86_64:
lynx-2.8.5-28.1.el5_2.1.x86_64.rpm     MD5: 2f53a2445c6570fbd85cb7e0a861577f
 
Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
lynx-2.8.4-18.1.3.src.rpm     MD5: 4cb1b16cff77ac3c2aabd3e25e3cd06f
 
IA-32:
lynx-2.8.4-18.1.3.i386.rpm     MD5: e8d9d3d4cbd5abe6006afd780277d584
 
IA-64:
lynx-2.8.4-18.1.3.ia64.rpm     MD5: acaf2b51d725c64d163cb750bcbac520
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
lynx-2.8.5-11.3.src.rpm     MD5: 04c3ac939554382ddbb4673604c63feb
 
IA-32:
lynx-2.8.5-11.3.i386.rpm     MD5: 70c1a5bdd685d81cfb3247a6979f7465
 
IA-64:
lynx-2.8.5-11.3.ia64.rpm     MD5: ad8f1e3327d76cd0d5b6a85a7168123d
 
PPC:
lynx-2.8.5-11.3.ppc.rpm     MD5: 91896f4217a1fc8df0910ca018002768
 
s390:
lynx-2.8.5-11.3.s390.rpm     MD5: 3b7953a624027b2178077deb6a63ff1b
 
s390x:
lynx-2.8.5-11.3.s390x.rpm     MD5: 8b59fb01c0aae9a19ff3c27e7dbd6232
 
x86_64:
lynx-2.8.5-11.3.x86_64.rpm     MD5: 475a53b660d5d8e6b4d614aa24d583b3
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
lynx-2.8.5-18.2.el4_7.1.src.rpm     MD5: 4178afb380ee08ebf180fe0edc7746c0
 
IA-32:
lynx-2.8.5-18.2.el4_7.1.i386.rpm     MD5: 1d5b908561c5ed4963da5e4462fbcb61
 
IA-64:
lynx-2.8.5-18.2.el4_7.1.ia64.rpm     MD5: 8f503d910d504a872c5cbbb729f49fff
 
PPC:
lynx-2.8.5-18.2.el4_7.1.ppc.rpm     MD5: d597f6955a7b739efd2837c4f7402dd2
 
s390:
lynx-2.8.5-18.2.el4_7.1.s390.rpm     MD5: b9f086ae13813063d9e703b505aa33ae
 
s390x:
lynx-2.8.5-18.2.el4_7.1.s390x.rpm     MD5: c316d16900fd4807757ae88e8266a0e2
 
x86_64:
lynx-2.8.5-18.2.el4_7.1.x86_64.rpm     MD5: d48e0bb4873d7770e9aa6aa40e91f0c6
 
Red Hat Enterprise Linux AS (v. 4.7.z)

SRPMS:
lynx-2.8.5-18.2.el4_7.1.src.rpm     MD5: 4178afb380ee08ebf180fe0edc7746c0
 
IA-32:
lynx-2.8.5-18.2.el4_7.1.i386.rpm     MD5: 1d5b908561c5ed4963da5e4462fbcb61
 
IA-64:
lynx-2.8.5-18.2.el4_7.1.ia64.rpm     MD5: 8f503d910d504a872c5cbbb729f49fff
 
PPC:
lynx-2.8.5-18.2.el4_7.1.ppc.rpm     MD5: d597f6955a7b739efd2837c4f7402dd2
 
s390:
lynx-2.8.5-18.2.el4_7.1.s390.rpm     MD5: b9f086ae13813063d9e703b505aa33ae
 
s390x:
lynx-2.8.5-18.2.el4_7.1.s390x.rpm     MD5: c316d16900fd4807757ae88e8266a0e2
 
x86_64:
lynx-2.8.5-18.2.el4_7.1.x86_64.rpm     MD5: d48e0bb4873d7770e9aa6aa40e91f0c6
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
lynx-2.8.5-28.1.el5_2.1.src.rpm     MD5: 50361cc8e52c87a49e9258250715aca9
 
IA-32:
lynx-2.8.5-28.1.el5_2.1.i386.rpm     MD5: 3883ef2cf36918afd0647adf24ec5bd0
 
x86_64:
lynx-2.8.5-28.1.el5_2.1.x86_64.rpm     MD5: 2f53a2445c6570fbd85cb7e0a861577f
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
lynx-2.8.4-18.1.3.src.rpm     MD5: 4cb1b16cff77ac3c2aabd3e25e3cd06f
 
IA-32:
lynx-2.8.4-18.1.3.i386.rpm     MD5: e8d9d3d4cbd5abe6006afd780277d584
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
lynx-2.8.5-11.3.src.rpm     MD5: 04c3ac939554382ddbb4673604c63feb
 
IA-32:
lynx-2.8.5-11.3.i386.rpm     MD5: 70c1a5bdd685d81cfb3247a6979f7465
 
IA-64:
lynx-2.8.5-11.3.ia64.rpm     MD5: ad8f1e3327d76cd0d5b6a85a7168123d
 
x86_64:
lynx-2.8.5-11.3.x86_64.rpm     MD5: 475a53b660d5d8e6b4d614aa24d583b3
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
lynx-2.8.5-18.2.el4_7.1.src.rpm     MD5: 4178afb380ee08ebf180fe0edc7746c0
 
IA-32:
lynx-2.8.5-18.2.el4_7.1.i386.rpm     MD5: 1d5b908561c5ed4963da5e4462fbcb61
 
IA-64:
lynx-2.8.5-18.2.el4_7.1.ia64.rpm     MD5: 8f503d910d504a872c5cbbb729f49fff
 
x86_64:
lynx-2.8.5-18.2.el4_7.1.x86_64.rpm     MD5: d48e0bb4873d7770e9aa6aa40e91f0c6
 
Red Hat Enterprise Linux ES (v. 4.7.z)

SRPMS:
lynx-2.8.5-18.2.el4_7.1.src.rpm     MD5: 4178afb380ee08ebf180fe0edc7746c0
 
IA-32:
lynx-2.8.5-18.2.el4_7.1.i386.rpm     MD5: 1d5b908561c5ed4963da5e4462fbcb61
 
IA-64:
lynx-2.8.5-18.2.el4_7.1.ia64.rpm     MD5: 8f503d910d504a872c5cbbb729f49fff
 
x86_64:
lynx-2.8.5-18.2.el4_7.1.x86_64.rpm     MD5: d48e0bb4873d7770e9aa6aa40e91f0c6
 
Red Hat Enterprise Linux EUS (v. 5.2.z server)

SRPMS:
lynx-2.8.5-28.1.el5_2.1.src.rpm     MD5: 50361cc8e52c87a49e9258250715aca9
 
IA-32:
lynx-2.8.5-28.1.el5_2.1.i386.rpm     MD5: 3883ef2cf36918afd0647adf24ec5bd0
 
IA-64:
lynx-2.8.5-28.1.el5_2.1.ia64.rpm     MD5: e6cf88eb488fba2d3b872a76502cc609
 
PPC:
lynx-2.8.5-28.1.el5_2.1.ppc.rpm     MD5: bee1e1394cb7f81de8cd9e9a1a0585d9
 
s390x:
lynx-2.8.5-28.1.el5_2.1.s390x.rpm     MD5: faa86319283b5b78a668fe961c9a70f3
 
x86_64:
lynx-2.8.5-28.1.el5_2.1.x86_64.rpm     MD5: 2f53a2445c6570fbd85cb7e0a861577f
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
lynx-2.8.4-18.1.3.src.rpm     MD5: 4cb1b16cff77ac3c2aabd3e25e3cd06f
 
IA-32:
lynx-2.8.4-18.1.3.i386.rpm     MD5: e8d9d3d4cbd5abe6006afd780277d584
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
lynx-2.8.5-11.3.src.rpm     MD5: 04c3ac939554382ddbb4673604c63feb
 
IA-32:
lynx-2.8.5-11.3.i386.rpm     MD5: 70c1a5bdd685d81cfb3247a6979f7465
 
IA-64:
lynx-2.8.5-11.3.ia64.rpm     MD5: ad8f1e3327d76cd0d5b6a85a7168123d
 
x86_64:
lynx-2.8.5-11.3.x86_64.rpm     MD5: 475a53b660d5d8e6b4d614aa24d583b3
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
lynx-2.8.5-18.2.el4_7.1.src.rpm     MD5: 4178afb380ee08ebf180fe0edc7746c0
 
IA-32:
lynx-2.8.5-18.2.el4_7.1.i386.rpm     MD5: 1d5b908561c5ed4963da5e4462fbcb61
 
IA-64:
lynx-2.8.5-18.2.el4_7.1.ia64.rpm     MD5: 8f503d910d504a872c5cbbb729f49fff
 
x86_64:
lynx-2.8.5-18.2.el4_7.1.x86_64.rpm     MD5: d48e0bb4873d7770e9aa6aa40e91f0c6
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
lynx-2.8.4-18.1.3.src.rpm     MD5: 4cb1b16cff77ac3c2aabd3e25e3cd06f
 
IA-64:
lynx-2.8.4-18.1.3.ia64.rpm     MD5: acaf2b51d725c64d163cb750bcbac520
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

214205 - CVE-2006-7234 lynx: .mailcap and .mime.types files read from CWD
468184 - CVE-2008-4690 lynx: remote arbitrary command execution via a crafted lynxcgi: URL


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/