Synopsis: Important: lynx security update Issue date: 2008-10-27 CVE Names: CVE-2008-4690 CVE-2006-7234 An arbitrary command execution flaw was found in the Lynx "lynxcgi:" URI handler. An attacker could create a web page redirecting to a malicious URL that could execute arbitrary code as the user running Lynx in the non-default "Advanced" user mode. (CVE-2008-4690) Note: In these updated lynx packages, Lynx will always prompt users before loading a "lynxcgi:" URI. Additionally, the default lynx.cfg configuration file now marks all "lynxcgi:" URIs as untrusted by default. A flaw was found in a way Lynx handled ".mailcap" and ".mime.types" configuration files. Files in the browser's current working directory were opened before those in the user's home directory. A local attacker, able to convince a user to run Lynx in a directory under their control, could possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234) SL 3.0.x SRPMS: lynx-2.8.5-11.3.src.rpm i386: lynx-2.8.5-11.3.i386.rpm x86_64: lynx-2.8.5-11.3.x86_64.rpm SL 4.x SRPMS: lynx-2.8.5-18.2.el4_7.1.src.rpm i386: lynx-2.8.5-18.2.el4_7.1.i386.rpm x86_64: lynx-2.8.5-18.2.el4_7.1.x86_64.rpm SL 5.x SRPMS: lynx-2.8.5-28.1.el5_2.1.src.rpm i386: lynx-2.8.5-28.1.el5_2.1.i386.rpm x86_64: lynx-2.8.5-28.1.el5_2.1.x86_64.rpm -Connie Sieh -Troy Dawson