Zwei Probleme in Elinks
ID: | USN-851-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 6.06 |
Datum: | Mi, 21. Oktober 2009, 22:48 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7224 |
Applikationen: | ELinks |
Originalnachricht |
|
--===============3287819732753779299== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="hHWLQfXTYDoKhP50" Content-Disposition: inline --hHWLQfXTYDoKhP50 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline =========================================================== Ubuntu Security Notice USN-851-1 October 21, 2009 elinks vulnerabilities CVE-2006-5925, CVE-2008-7224 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: elinks 0.10.6-1ubuntu3.4 elinks-lite 0.10.6-1ubuntu3.4 After a standard system upgrade you need to restart Elinks to effect the necessary changes. Details follow: Teemu Salmela discovered that Elinks did not properly validate input when processing smb:// URLs. If a user were tricked into viewing a malicious website and had smbclient installed, a remote attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2006-5925) Jakub Wilk discovered a logic error in Elinks, leading to a buffer overflow. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-7224) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4.diff.gz Size/MD5: 32513 2337a42ab88b259360509ca287a7fdb4 http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4.dsc Size/MD5: 746 35c7278a815709ad6049c98eff1e21f9 http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6.orig.tar.gz Size/MD5: 3651428 0243203b9e54cf0cf002fca31244ce79 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4_amd64.deb Size/MD5: 907150 31ade5835f45e514e0c0b1a7dd86cc17 http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.4_amd64.deb Size/MD5: 732642 b8581260f7a96f74a4658367c4589948 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4_i386.deb Size/MD5: 845652 030f2fa6d5e6345322ff9e721a8e6150 http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.4_i386.deb Size/MD5: 683282 433e35cea4c997bab0363c0bdb1b327b powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4_powerpc.deb Size/MD5: 890200 16446dc0b839fc78d335df36fe7515bb http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.4_powerpc.deb Size/MD5: 721242 4e90bc3c72980c0337f5c05a8eb62d69 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4_sparc.deb Size/MD5: 862772 740ae50cb4c3d0f3ca5ee4c8cf94861d http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.4_sparc.deb Size/MD5: 697860 eb467ca12766aed2c5e7c1da96a3ccff --hHWLQfXTYDoKhP50 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkrfY5sACgkQW0JvuRdL8Bqf9QCeMDzfPoFwEjDXVDC5tz70d8CM zUoAoIc3k319GohOUhDyTHPiwk7Jktz4 =v51q -----END PGP SIGNATURE----- --hHWLQfXTYDoKhP50-- --===============3287819732753779299== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============3287819732753779299==-- |