Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2017:0599-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2017/suse-su-20170599-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:0599-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:0599-1
Related
CVE-2016-9179
Published
2017-03-03T16:47:37Z
Modified
2017-03-03T16:47:37Z
Summary
Security update for lynx
Details
This update for lynx fixes the following issues:
CVE-2016-9179: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host. (bsc#1008642)
References
https://www.suse.com/support/update/announcement/2017/suse-su-20170599-1/
https://bugzilla.suse.com/1008642
https://www.suse.com/security/cve/CVE-2016-9179
Affected packages
SUSE:Linux Enterprise Software Development Kit 11 SP4
/
lynx
Package
Name
lynx
Purl
pkg:rpm/suse/lynx&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2.8.6-145.1
Ecosystem specific
{ "binaries": [ { "lynx": "2.8.6-145.1" } ] }
SUSE-SU-2017:0599-1 - OSV