TITLE: Mandriva update for lynx SECUNIA ADVISORY ID: SA17546 VERIFY ADVISORY: http://secunia.com/advisories/17546/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Mandrake Corporate Server 2.x http://secunia.com/product/1222/ Mandrakelinux 10.1 http://secunia.com/product/4198/ DESCRIPTION: Mandriva has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. For more information: SA17372 SOLUTION: Apply updated packages. Mandrakelinux 10.1: d159808dc386722d03f80c9e92ec3892 10.1/RPMS/lynx-2.8.5-1.3.101mdk.i586.rpm 8a2235e8844d26d93d68fe8450c173d0 10.1/SRPMS/lynx-2.8.5-1.3.101mdk.src.rpm Mandrakelinux 10.1/X86_64: 0ffac10c91727b3c3a9b7988ad254b0c x86_64/10.1/RPMS/lynx-2.8.5-1.3.101mdk.x86_64.rpm 8a2235e8844d26d93d68fe8450c173d0 x86_64/10.1/SRPMS/lynx-2.8.5-1.3.101mdk.src.rpm Corporate Server 2.1: 5722c024a1d5642cbfd93e91a5a11e81 corporate/2.1/RPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.i586.rpm 7794c13cd786fd5bea163b3128d41253 corporate/2.1/SRPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.src.rpm Corporate Server 2.1/X86_64: df29c26d3532351e2ba0e23785f6bcd5 x86_64/corporate/2.1/RPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.x86_64.rpm 7794c13cd786fd5bea163b3128d41253 x86_64/corporate/2.1/SRPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.src.rpm ORIGINAL ADVISORY: http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:211 OTHER REFERENCES: SA17372: http://secunia.com/advisories/17372/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------