[USN-519-1] elinks vulnerability

Kees Cook kees at ubuntu.com
Tue Sep 25 22:51:37 BST 2007


=========================================================== 
Ubuntu Security Notice USN-519-1         September 25, 2007
elinks vulnerability
CVE-2007-5034
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  elinks                          0.10.6-1ubuntu3.2

Ubuntu 6.10:
  elinks                          0.11.1-1ubuntu2.2

Ubuntu 7.04:
  elinks                          0.11.1-1.2ubuntu2.2

In general, a standard system upgrade is sufficient to affect the
necessary changes.

Details follow:

Kalle Olavi Niemitalo discovered that if elinks makes a POST request
to an HTTPS URL through a proxy, information may be sent in clear-text
between elinks and the proxy.  Attackers with access to the network
could steal sensitive information (such as passwords).


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.diff.gz
      Size/MD5:    31374 745db778d8da48d5bd8fd62313c299d9
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.dsc
      Size/MD5:      738 c0ea523a913d279a70c8a74ae91710be
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6.orig.tar.gz
      Size/MD5:  3651428 0243203b9e54cf0cf002fca31244ce79

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_amd64.deb
      Size/MD5:   906814 2923d69aaad9fdf510f0778938a52890
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_amd64.deb
      Size/MD5:   732418 08d581518d511b015357b636b4b4bec2

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_i386.deb
      Size/MD5:   845344 b17b1d3b39e18b37244fa9803d727e28
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_i386.deb
      Size/MD5:   682980 7c5d2abc9e6be4a33d751cbeea3eacac

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_powerpc.deb
      Size/MD5:   889800 008c03be901b15f7245786b29c835712
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_powerpc.deb
      Size/MD5:   720926 d035afed6c4fefd680961719da376c66

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_sparc.deb
      Size/MD5:   862606 47b706af007c5e742d292975d2976d40
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_sparc.deb
      Size/MD5:   697554 6a69e45f969f2f9322c2e120b024cc59

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.diff.gz
      Size/MD5:    30804 7375454f7de82c81875704c8ace8fbfa
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.dsc
      Size/MD5:      747 ac4ab40f6c646071391977da8803c6a3
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz
      Size/MD5:  3863617 dce0fa7cb2b6e7194ddd00e34825218b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_amd64.deb
      Size/MD5:   663838 f01381b5e0c58a16def5bbe48400033d
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_amd64.deb
      Size/MD5:   460418 374d2e22edbaa346dec5f20d8959fbe3

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_i386.deb
      Size/MD5:   621490 8b7c70e58374453a00d9be6985287f6b
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_i386.deb
      Size/MD5:   418576 c46df44d6a25bd29f9e1030ac1736fc5

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_powerpc.deb
      Size/MD5:   656474 6a91b696b81c1498201610c53e475488
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_powerpc.deb
      Size/MD5:   453276 5490e3dccea1d7e4e9217b060eafdac7

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_sparc.deb
      Size/MD5:   623180 88567da087d6bafc207e1c2ae36f00f9
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_sparc.deb
      Size/MD5:   420738 a93466a63b8738442b9b7b8a8956d172

Updated packages for Ubuntu 7.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.diff.gz
      Size/MD5:    30996 47f76e223281a4766374ad9bfd28b2b4
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.dsc
      Size/MD5:      835 04e6aa0377c01a16a342b0515f4ed67d
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz
      Size/MD5:  3863617 dce0fa7cb2b6e7194ddd00e34825218b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_amd64.deb
      Size/MD5:   667320 1ac7f9264a8116cfa941714ef2883baf
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_amd64.deb
      Size/MD5:   469024 4a9ed475d63bb65ff94b1e2e6cf4f22b

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_i386.deb
      Size/MD5:   625670 73987ab1453f8064741a48c1b1c29c3e
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_i386.deb
      Size/MD5:   425266 61137c1a5ed972040f2ce3866dbc4960

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_powerpc.deb
      Size/MD5:   665316 9322259cb40f15081498b34af26ccae4
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_powerpc.deb
      Size/MD5:   463014 b743d08aae093f63c2181f702a5ec810

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_sparc.deb
      Size/MD5:   631170 b163c245dadaadc10352694f741fe0d9
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_sparc.deb
      Size/MD5:   430040 ff48526da8dd46fd2e3c012756fa52de

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20070925/3da008b0/attachment.pgp 


More information about the ubuntu-security-announce mailing list