TITLE:
Mandriva update for lynx

SECUNIA ADVISORY ID:
SA17546

VERIFY ADVISORY:
http://secunia.com/advisories/17546/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

OPERATING SYSTEM:
Mandrake Corporate Server 2.x
http://secunia.com/product/1222/
Mandrakelinux 10.1
http://secunia.com/product/4198/

DESCRIPTION:
Mandriva has issued an update for lynx. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

For more information:
SA17372

SOLUTION:
Apply updated packages.

Mandrakelinux 10.1:

d159808dc386722d03f80c9e92ec3892
10.1/RPMS/lynx-2.8.5-1.3.101mdk.i586.rpm
8a2235e8844d26d93d68fe8450c173d0
10.1/SRPMS/lynx-2.8.5-1.3.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:

0ffac10c91727b3c3a9b7988ad254b0c
x86_64/10.1/RPMS/lynx-2.8.5-1.3.101mdk.x86_64.rpm
8a2235e8844d26d93d68fe8450c173d0
x86_64/10.1/SRPMS/lynx-2.8.5-1.3.101mdk.src.rpm

Corporate Server 2.1:

5722c024a1d5642cbfd93e91a5a11e81
corporate/2.1/RPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.i586.rpm
7794c13cd786fd5bea163b3128d41253
corporate/2.1/SRPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.src.rpm

Corporate Server 2.1/X86_64:

df29c26d3532351e2ba0e23785f6bcd5
x86_64/corporate/2.1/RPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.x86_64.rpm
7794c13cd786fd5bea163b3128d41253
x86_64/corporate/2.1/SRPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.src.rpm

ORIGINAL ADVISORY:
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:211

OTHER REFERENCES:
SA17372:
http://secunia.com/advisories/17372/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------