Skip to navigation

Security Advisory Important: elinks security update

Advisory: RHSA-2009:1471-1
Type: Security Advisory
Severity: Important
Issued on: 2009-10-01
Last updated on: 2009-10-01
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux EUS (v. 5.4.z server)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2007-2027
CVE-2008-7224

Details

An updated elinks package that fixes two security issues is now available
for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

ELinks is a text-based Web browser. ELinks does not display any images, but
it does support frames, tables, and most other HTML tags.

An off-by-one buffer overflow flaw was discovered in the way ELinks handled
its internal cache of string representations for HTML special entities. A
remote attacker could use this flaw to create a specially-crafted HTML file
that would cause ELinks to crash or, possibly, execute arbitrary code when
rendered. (CVE-2008-7224)

It was discovered that ELinks tried to load translation files using
relative paths. A local attacker able to trick a victim into running ELinks
in a folder containing specially-crafted translation files could use this
flaw to confuse the victim via incorrect translations, or cause ELinks to
crash and possibly execute arbitrary code via embedded formatting sequences
in translated messages. (CVE-2007-2027)

All ELinks users are advised to upgrade to this updated package, which
contains backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
elinks-0.9.2-4.el4_8.1.src.rpm     MD5: e8945d546dd36066765c3dc0fcda7cac
 
IA-32:
elinks-0.9.2-4.el4_8.1.i386.rpm     MD5: 159d10da8b92f875ad1c4d8997ac3e43
 
x86_64:
elinks-0.9.2-4.el4_8.1.x86_64.rpm     MD5: 775302b9129cb485b886ef62b6e289c9
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
elinks-0.11.1-6.el5_4.1.src.rpm
File outdated by:  RHSA-2013:0250
    MD5: 9498648fffb250da27d857796f1124ee
 
IA-32:
elinks-0.11.1-6.el5_4.1.i386.rpm
File outdated by:  RHSA-2013:0250
    MD5: 9868bb57bf064fec863d1012b4162a61
 
IA-64:
elinks-0.11.1-6.el5_4.1.ia64.rpm
File outdated by:  RHSA-2013:0250
    MD5: 9f5d0c62466dad0461af19ae4a398b81
 
PPC:
elinks-0.11.1-6.el5_4.1.ppc.rpm
File outdated by:  RHSA-2013:0250
    MD5: 4ad47f4a271f569310559240f3a77880
 
s390x:
elinks-0.11.1-6.el5_4.1.s390x.rpm
File outdated by:  RHSA-2013:0250
    MD5: fc5d77b7e6c1c841458218eecd464cec
 
x86_64:
elinks-0.11.1-6.el5_4.1.x86_64.rpm
File outdated by:  RHSA-2013:0250
    MD5: ecde5bcca6d26c6a535eaa1dbc5c21eb
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
elinks-0.9.2-4.el4_8.1.src.rpm     MD5: e8945d546dd36066765c3dc0fcda7cac
 
IA-32:
elinks-0.9.2-4.el4_8.1.i386.rpm     MD5: 159d10da8b92f875ad1c4d8997ac3e43
 
IA-64:
elinks-0.9.2-4.el4_8.1.ia64.rpm     MD5: 2a54c84597ed255b41d42025ca043081
 
PPC:
elinks-0.9.2-4.el4_8.1.ppc.rpm     MD5: da7bc8ce1d99fa41d9a185f64463eb71
 
s390:
elinks-0.9.2-4.el4_8.1.s390.rpm     MD5: 7d04b6b8fc8618ed11f3ef31462f8686
 
s390x:
elinks-0.9.2-4.el4_8.1.s390x.rpm     MD5: fb1856f9c4900da2f03fc5882f1095fd
 
x86_64:
elinks-0.9.2-4.el4_8.1.x86_64.rpm     MD5: 775302b9129cb485b886ef62b6e289c9
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
elinks-0.9.2-4.el4_8.1.src.rpm     MD5: e8945d546dd36066765c3dc0fcda7cac
 
IA-32:
elinks-0.9.2-4.el4_8.1.i386.rpm     MD5: 159d10da8b92f875ad1c4d8997ac3e43
 
IA-64:
elinks-0.9.2-4.el4_8.1.ia64.rpm     MD5: 2a54c84597ed255b41d42025ca043081
 
PPC:
elinks-0.9.2-4.el4_8.1.ppc.rpm     MD5: da7bc8ce1d99fa41d9a185f64463eb71
 
s390:
elinks-0.9.2-4.el4_8.1.s390.rpm     MD5: 7d04b6b8fc8618ed11f3ef31462f8686
 
s390x:
elinks-0.9.2-4.el4_8.1.s390x.rpm     MD5: fb1856f9c4900da2f03fc5882f1095fd
 
x86_64:
elinks-0.9.2-4.el4_8.1.x86_64.rpm     MD5: 775302b9129cb485b886ef62b6e289c9
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
elinks-0.11.1-6.el5_4.1.src.rpm
File outdated by:  RHSA-2013:0250
    MD5: 9498648fffb250da27d857796f1124ee
 
IA-32:
elinks-0.11.1-6.el5_4.1.i386.rpm
File outdated by:  RHSA-2013:0250
    MD5: 9868bb57bf064fec863d1012b4162a61
 
x86_64:
elinks-0.11.1-6.el5_4.1.x86_64.rpm
File outdated by:  RHSA-2013:0250
    MD5: ecde5bcca6d26c6a535eaa1dbc5c21eb
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
elinks-0.9.2-4.el4_8.1.src.rpm     MD5: e8945d546dd36066765c3dc0fcda7cac
 
IA-32:
elinks-0.9.2-4.el4_8.1.i386.rpm     MD5: 159d10da8b92f875ad1c4d8997ac3e43
 
IA-64:
elinks-0.9.2-4.el4_8.1.ia64.rpm     MD5: 2a54c84597ed255b41d42025ca043081
 
x86_64:
elinks-0.9.2-4.el4_8.1.x86_64.rpm     MD5: 775302b9129cb485b886ef62b6e289c9
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
elinks-0.9.2-4.el4_8.1.src.rpm     MD5: e8945d546dd36066765c3dc0fcda7cac
 
IA-32:
elinks-0.9.2-4.el4_8.1.i386.rpm     MD5: 159d10da8b92f875ad1c4d8997ac3e43
 
IA-64:
elinks-0.9.2-4.el4_8.1.ia64.rpm     MD5: 2a54c84597ed255b41d42025ca043081
 
x86_64:
elinks-0.9.2-4.el4_8.1.x86_64.rpm     MD5: 775302b9129cb485b886ef62b6e289c9
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
elinks-0.11.1-6.el5_4.1.src.rpm
File outdated by:  RHSA-2013:0250
    MD5: 9498648fffb250da27d857796f1124ee
 
IA-32:
elinks-0.11.1-6.el5_4.1.i386.rpm     MD5: 9868bb57bf064fec863d1012b4162a61
 
IA-64:
elinks-0.11.1-6.el5_4.1.ia64.rpm     MD5: 9f5d0c62466dad0461af19ae4a398b81
 
PPC:
elinks-0.11.1-6.el5_4.1.ppc.rpm     MD5: 4ad47f4a271f569310559240f3a77880
 
s390x:
elinks-0.11.1-6.el5_4.1.s390x.rpm     MD5: fc5d77b7e6c1c841458218eecd464cec
 
x86_64:
elinks-0.11.1-6.el5_4.1.x86_64.rpm     MD5: ecde5bcca6d26c6a535eaa1dbc5c21eb
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
elinks-0.9.2-4.el4_8.1.src.rpm     MD5: e8945d546dd36066765c3dc0fcda7cac
 
IA-32:
elinks-0.9.2-4.el4_8.1.i386.rpm     MD5: 159d10da8b92f875ad1c4d8997ac3e43
 
IA-64:
elinks-0.9.2-4.el4_8.1.ia64.rpm     MD5: 2a54c84597ed255b41d42025ca043081
 
x86_64:
elinks-0.9.2-4.el4_8.1.x86_64.rpm     MD5: 775302b9129cb485b886ef62b6e289c9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

235411 - CVE-2007-2027 elinks tries to load .po files from a non-absolute path
523258 - CVE-2008-7224 elinks: entity_cache static array buffer overflow (off-by-one)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/