Debian Bug report logs - #152810
lynx: Maximum cookie limit could be increased or configurable

version graph

Package: lynx; Maintainer for lynx is Atsuhito KOHDA <>; Source for lynx is src:lynx-cur.

Reported by: "S. Wegner" <>

Date: Sat, 13 Jul 2002 02:48:03 UTC

Severity: wishlist

Tags: fixed-upstream, upstream

Fixed in version lynx/2.8.6-1

Done: (Zephaniah E. Hull)

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox

Report forwarded to James Troup <>,
Bug#152810; Package lynx-ssl. Full text and rfc822 format available.

Acknowledgement sent to "S. Wegner" <>:
New Bug report received and forwarded. Copy sent to James Troup <>, Full text and rfc822 format available.

Message #5 received at (full text, mbox):

From: "S. Wegner" <>
To: "Debian Bug Tracking System" <>
Subject: lynx-ssl: Maximum cookie limit could be increased or configurable
Date: Fri, 12 Jul 2002 19:37:18 -0700
Package: lynx-ssl
Version: 1:
Severity: wishlist
Tags: upstream


When all of a sudden some sites stopped working with lynx, I checked the
Lynx trace output and it seems there is a hardcoded maximum cookie limit of
500 cookies.  Since every site and it's dog uses cookies, you might consider
increasing it to 5000 or better yet, have it configurable via lynx.cfg.  The
limit is:
src/LYCookie.c: #define max_cookies_global
and probably applies to the lynx (non-ssl) package as well.

Another point which may or may not be important is when Lynx hits this
limit, it silently (as far as the user is concerned) rejects the cookie. 
The only error message occurs if Lynx trace output is enabled.

Best regards,

-- System Information:
Debian Release: 3.0
Architecture: i386
Kernel: Linux continuum 2.4.19-rc1 #1 SMP Mon Jul 8 14:13:30 PDT 2002 i686

Versions of packages lynx-ssl depends on:
ii  libc6                    2.2.5-7         GNU C Library: Shared libraries an
ii  libncurses5              5.2.20020112a-8 Shared libraries for terminal hand
ii  libssl0.9.6              0.9.6d-1        SSL shared libraries
ii  zlib1g                   1:1.1.4-1       compression library - runtime

-- debconf information excluded

Bug reassigned from package `lynx-ssl' to `lynx'. Request was from James Troup <> to Full text and rfc822 format available.

Changed Bug title. Request was from James Troup <> to Full text and rfc822 format available.

Message sent on to "S. Wegner" <>:
Bug#152810. Full text and rfc822 format available.

Message #12 received at (full text, mbox):

From: Thomas Dickey <>
Subject: re: #152810 - lynx: Maximum cookie limit could be increased or configurable
Date: Thu, 30 Dec 2004 07:48:02 -0500
[Message part 1 (text/plain, inline)]
fixed in lynx 2.8.6dev.9

Thomas E. Dickey <>
[signature.asc (application/pgp-signature, inline)]

Tags added: fixed-upstream Request was from Thomas Dickey <> to Full text and rfc822 format available.

Reply sent to (Zephaniah E. Hull):
You have taken responsibility. Full text and rfc822 format available.

Notification sent to "S. Wegner" <>:
Bug acknowledged by developer. Full text and rfc822 format available.

Message #19 received at (full text, mbox):

From: (Zephaniah E. Hull)
Subject: Bug#152810: fixed in lynx 2.8.6-1
Date: Tue, 01 May 2007 06:17:03 +0000
Source: lynx
Source-Version: 2.8.6-1

We believe that the bug you reported is fixed in the latest version of
lynx, which is due to be installed in the Debian FTP archive:

  to pool/main/l/lynx/lynx_2.8.6-1.diff.gz
  to pool/main/l/lynx/lynx_2.8.6-1.dsc
  to pool/main/l/lynx/lynx_2.8.6-1_amd64.deb
  to pool/main/l/lynx/lynx_2.8.6.orig.tar.gz

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Zephaniah E. Hull <> (supplier of updated lynx package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing

Hash: SHA1

Format: 1.7
Date: Tue, 01 May 2007 01:43:17 -0400
Source: lynx
Binary: lynx
Architecture: source amd64
Version: 2.8.6-1
Distribution: unstable
Urgency: low
Maintainer: Zephaniah E. Hull <>
Changed-By: Zephaniah E. Hull <>
 lynx       - Text-mode WWW Browser
Closes: 40435 67184 99400 120451 121520 132674 137480 141158 147287 152810 157088 171312 184482 188415 193205 204994 240237 244871 248092 252915 254515 265031 268264 271048 304989 313789 315853 318034 325478 343049 344275 374388 390918
 lynx (2.8.6-1) unstable; urgency=low
   * Hijack the package.  I might not be great at it, but I do use it daily.
   * New upstream release.
     Closes: #254515, #137480, #67184, #99400, #132674, #141158, #40435,
     #120451, #157088, #204994, #244871, #248092, #268264, #271048, #318034,
     #343049, #390918, #240237, #313789, #171312, #193205, #252915, #265031,
     #121520, #152810, #188415, #344275, #374388, #184482, #315853
   * Uses the new upstream defaults. Closes: #325478, #147287.
   * Update 01_default-config.dpatch. (Offset changes only.)
   * Update 02_default-key-bindings.dpatch. (Upstream formatting changes.)
   * Kill 03_newer_gnutls.dpatch entirely.
     This was fixed upstream.  But this is also a GPL violation as we only ship
     the patch to configure, and not to, the source file.
   * Kill 04_CVE-2004-1617.dpatch. (Merged into upstream.)
   * Disable 05_FTBFS_on_GNUHurd_and_GNUkBSD (Upstream changes, file new bug if
     we FTBFS again.)
   * Removed configure arguments:
     --enable-8bit-toupper - Removed, no longer exists.
     --enable-persistent-cookies - Enabled by default.
     --enable-prettysrc - Enabled by default.
     --enable-source-cache - Enabled by default.
     --enable-read-eta - Enabled by default.
   * Added configure arguments:
     --enable-nsl-fork - fork NSL requests, allowing them to be aborted
     --enable-justify-elts - use element-justification logic
   * Update the contents and location of lynx.desktop. Closes: 304989.
   * Other things will be handled by later uploads, patches welcome.
 5f2a3005f67b144c6093ae875957d5fe 605 web optional lynx_2.8.6-1.dsc
 2158041a3fdb5d094831da2c82cfcaba 3195728 web optional lynx_2.8.6.orig.tar.gz
 24699d4e88618f94d9dd2b3e88ca41ef 15521 web optional lynx_2.8.6-1.diff.gz
 e44c39690127312aa16149da5356ce4b 2010044 web optional lynx_2.8.6-1_amd64.deb

Version: GnuPG v1.4.6 (GNU/Linux)


Bug archived. Request was from Debbugs Internal Request <> to (Wed, 04 Jul 2007 07:34:16 GMT) Full text and rfc822 format available.

Send a report that this bug log contains spam.

Debian bug tracking system administrator <>. Last modified: Fri Apr 18 19:27:55 2014; Machine Name:

Debian Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.