CVE-2016-9179

NameCVE-2016-9179
Descriptionlynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-719-1
Debian Bugs843258

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lynx (PTS)stretch (security), stretch (lts), stretch2.8.9dev11-1+deb9u1fixed
buster (security), buster, buster (lts)2.8.9rel.1-3+deb10u1fixed
bullseye (security), bullseye2.9.0dev.6-3~deb11u1fixed
bookworm2.9.0dev.12-1fixed
sid, trixie2.9.2-1fixed
lynx-cur (PTS)jessie, jessie (lts)2.8.9dev1-2+deb8u2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lynxsource(unstable)2.8.9dev11-1843258
lynx-cursourcewheezy2.8.8dev.12-2+deb7u1DLA-719-1
lynx-cursource(unstable)(unfixed)

Notes

[jessie] - lynx-cur <no-dsa> (Minor issue)
https://www.openwall.com/lists/oss-security/2016/11/03/4
Slight mitigation and documentation improvement was done in 2.8.9dev.10 upstream
the uplaod to unstable as 2.8.9dev10-1

Search for package or bug name: Reporting problems