Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:30263
HistoryJan 29, 2014 - 12:00 a.m.

[ MDVSA-2014:019 ] elinks

2014-01-2900:00:00
vulners.com
14

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2014:019
http://www.mandriva.com/en/support/security/


Package : elinks
Date : January 22, 2014
Affected: Business Server 1.0


Problem Description:

Updated elinks package fixes security vulnerability:

When verifying SSL certificates, elinks fails to warn the user if the
hostname of the certificate does not match the hostname of the website.

The elinks package has been updated to version 0.12-pre6 and patched
to fix this issue.


References:

http://advisories.mageia.org/MGASA-2014-0014.html


Updated Packages:

Mandriva Business Server 1/X86_64:
1fecee049f4428cb6ba3c7a2c47165f8 mbs1/x86_64/elinks-0.12-2.2.mbs1.x86_64.rpm
dd348dca6d0834c1a9b297054fd8542e mbs1/SRPMS/elinks-0.12-2.2.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFS37/+mqjQ0CJFipgRAszFAKCjKF/DhyN4zzNuVavfVvc5qGHQQQCfZT5o
ooTjS1fFsF9ptO3pXe7nEO8=
=9dNz
-----END PGP SIGNATURE-----