Summary: | <www-client/lynx-2.8.9_pre11: invalid URL parsing with '?' (CVE-2016-9179) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | radhermit |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/11/03/4 | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: |
=www-client/lynx-2.8.9_pre11
|
Runtime testing required: | --- |
Description
Agostino Sarubbo
2016-11-04 09:11:56 UTC
Upstread addressed the issue in 2016-11-08 (2.8.9dev.10) * improved fix for OpenSSL 1.1 (Taketo Kabe). * improve warning message when stripping user/password from URL; report on http://seclists.org/oss-sec/2016/q4/322 treated as a Lynx parsing error the punctuation such as "?" which is permitted by RFC-1738 in a user or password field. RFC-3986 subsequently modified this. The improved message points out the possible confusion by users when these fields contain punctuation -TD [...] From http://lynx.invisible-island.net/current/CHANGES @ Maintainer(s): Can we start stabilization of =www-client/lynx-2.8.9_pre11? @ Arches, please test and mark stable: =www-client/lynx-2.8.9_pre11 Stable for HPPA. amd64 stable ppc and ppc64 stable x86 stable arm stable Stable on alpha. sparc stable ia64 stable. Maintainer(s), please cleanup. Security, please vote. GLSA Vote: No @ Maintainer(s): Please cleanup and drop <www-client/lynx-2.8.9_pre11! Arches and Maintainer(s), Thank you for your work. |