Your message dated Mon, 27 Nov 2006 08:47:04 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#396964: fixed in lynx 2.8.5-2sarge2.2 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: lynx-cur Version: 2.8.7dev1-1 Severity: grave Tags: security Justification: user security hole Lynx attempts to use the .mime.types and .mailcap files located in the current directory: $ strace lynx -dump 2>&1 | grep '^open("[^/]' open(".mailcap", O_RDONLY) = -1 ENOENT (No such file or directory) open(".mime.types", O_RDONLY) = -1 ENOENT (No such file or directory) $ This allows an attacker to cause lynx to execute arbitrary shell code when a user runs lynx while visiting a directory with attacker-provided contents. -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (x86_64) Shell: /bin/sh linked to /bin/dash Kernel: Linux 2.6.18 Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8) Versions of packages lynx-cur depends on: ii debconf [debconf-2.0] 1.5.8 Debian configuration management sy ii libc6 2.3.6.ds1-4 GNU C Library: Shared libraries ii libgnutls13 1.4.4-1 the GNU TLS library - runtime libr ii libncursesw5 5.5-5 Shared libraries for terminal hand ii zlib1g 1:1.2.3-13 compression library - runtime Versions of packages lynx-cur recommends: ii mime-support 3.37-1 MIME files 'mime.types' & 'mailcap -- debconf information: * lynx-cur/defaulturl: http://www.google.pl/ lynx-cur/etc_lynx.cfg:
--- End Message ---
--- Begin Message ---Source: lynx Source-Version: 2.8.5-2sarge2.2 We believe that the bug you reported is fixed in the latest version of lynx, which is due to be installed in the Debian FTP archive: lynx_2.8.5-2sarge2.2.diff.gz to pool/main/l/lynx/lynx_2.8.5-2sarge2.2.diff.gz lynx_2.8.5-2sarge2.2.dsc to pool/main/l/lynx/lynx_2.8.5-2sarge2.2.dsc lynx_2.8.5-2sarge2.2_i386.deb to pool/main/l/lynx/lynx_2.8.5-2sarge2.2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andreas Barth <[EMAIL PROTECTED]> (supplier of updated lynx package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 27 Nov 2006 07:43:17 +0100 Source: lynx Binary: lynx Architecture: source i386 Version: 2.8.5-2sarge2.2 Distribution: unstable Urgency: low Maintainer: James Troup <[EMAIL PROTECTED]> Changed-By: Andreas Barth <[EMAIL PROTECTED]> Description: lynx - Text-mode WWW Browser Closes: 396964 Changes: lynx (2.8.5-2sarge2.2) unstable; urgency=low . * Non-maintainer upload. * Read user configuration from home directory, not current working directory. Closes: #396964 Thanks to Tom Parker for the patch. Files: 8e29b107936e7c665307555f758c33d3 616 web optional lynx_2.8.5-2sarge2.2.dsc 8faaf1bdfa1f40122a680e277b19d6f8 18375 web optional lynx_2.8.5-2sarge2.2.diff.gz 9065b8b8ef04961537aa3fe56b8a393d 1859352 web optional lynx_2.8.5-2sarge2.2_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFFaqMrmdOZoew2oYURArWWAJsHUDW60sYQhojnxIY2M8GlBIn5zACfWRwH nqjt5N8X2d0oBETjhasR6Oc= =kM8Z -----END PGP SIGNATURE-----
--- End Message ---

