Skip to navigation

Security Advisory Moderate: elinks security update

Advisory: RHSA-2007:0933-2
Type: Security Advisory
Severity: Moderate
Issued on: 2007-10-03
Last updated on: 2007-10-03
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.5.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.5.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2007-5034

Details

An updated ELinks package that corrects a security vulnerability is now
available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

ELinks is a text mode Web browser used from the command line that supports
rendering modern web pages.

An information disclosure flaw was found in the way ELinks passes https
POST data to a proxy server. POST data sent via a proxy to an https site is
not properly encrypted by ELinks, possibly allowing the disclosure of
sensitive information. (CVE-2007-5034)

All users of Elinks are advised to upgrade to this updated package, which
contains a backported patch that resolves this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
elinks-0.9.2-3.3.5.2.src.rpm
File outdated by:  RHSA-2009:1471
    MD5: f04cc8143e0eeb2479926cfdd47517bc
 
IA-32:
elinks-0.9.2-3.3.5.2.i386.rpm
File outdated by:  RHSA-2009:1471
    MD5: 740855a258e36afc4bd02b2dc939f6d0
 
x86_64:
elinks-0.9.2-3.3.5.2.x86_64.rpm
File outdated by:  RHSA-2009:1471
    MD5: ca4941f6358b9b351285bb7268ee368c
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
elinks-0.11.1-5.1.0.1.el5.src.rpm
File outdated by:  RHSA-2013:0250
    MD5: df97aa87a94550dd9c6b8b3ab4e6f717
 
IA-32:
elinks-0.11.1-5.1.0.1.el5.i386.rpm
File outdated by:  RHSA-2013:0250
    MD5: 7b4b7287bc524c45dc55a702ea6243ea
 
IA-64:
elinks-0.11.1-5.1.0.1.el5.ia64.rpm
File outdated by:  RHSA-2013:0250
    MD5: 7bc784e2951af8725c9876a28c942c5d
 
PPC:
elinks-0.11.1-5.1.0.1.el5.ppc.rpm
File outdated by:  RHSA-2013:0250
    MD5: 04978852cf223ad9d338eea7e4fffe07
 
s390x:
elinks-0.11.1-5.1.0.1.el5.s390x.rpm
File outdated by:  RHSA-2013:0250
    MD5: 32cce00b9e70804720d80e5c2dd80960
 
x86_64:
elinks-0.11.1-5.1.0.1.el5.x86_64.rpm
File outdated by:  RHSA-2013:0250
    MD5: 5cd0b473ae6d27f879f48aa2085e6380
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
elinks-0.9.2-3.3.5.2.src.rpm
File outdated by:  RHSA-2009:1471
    MD5: f04cc8143e0eeb2479926cfdd47517bc
 
IA-32:
elinks-0.9.2-3.3.5.2.i386.rpm
File outdated by:  RHSA-2009:1471
    MD5: 740855a258e36afc4bd02b2dc939f6d0
 
IA-64:
elinks-0.9.2-3.3.5.2.ia64.rpm
File outdated by:  RHSA-2009:1471
    MD5: d27d29fc20f082fd5c4e3d16a1f1b96f
 
PPC:
elinks-0.9.2-3.3.5.2.ppc.rpm
File outdated by:  RHSA-2009:1471
    MD5: 2901b97c6ad3dd7fae25a44348b82812
 
s390:
elinks-0.9.2-3.3.5.2.s390.rpm
File outdated by:  RHSA-2009:1471
    MD5: 1d225484d90ff04080c3d570dd54e8d5
 
s390x:
elinks-0.9.2-3.3.5.2.s390x.rpm
File outdated by:  RHSA-2009:1471
    MD5: f9d32215514a0c003d315cb8a22305bc
 
x86_64:
elinks-0.9.2-3.3.5.2.x86_64.rpm
File outdated by:  RHSA-2009:1471
    MD5: ca4941f6358b9b351285bb7268ee368c
 
Red Hat Enterprise Linux AS (v. 4.5.z)

SRPMS:
elinks-0.9.2-3.3.5.2.src.rpm
File outdated by:  RHSA-2009:1471
    MD5: f04cc8143e0eeb2479926cfdd47517bc
 
IA-32:
elinks-0.9.2-3.3.5.2.i386.rpm     MD5: 740855a258e36afc4bd02b2dc939f6d0
 
IA-64:
elinks-0.9.2-3.3.5.2.ia64.rpm     MD5: d27d29fc20f082fd5c4e3d16a1f1b96f
 
PPC:
elinks-0.9.2-3.3.5.2.ppc.rpm     MD5: 2901b97c6ad3dd7fae25a44348b82812
 
s390:
elinks-0.9.2-3.3.5.2.s390.rpm     MD5: 1d225484d90ff04080c3d570dd54e8d5
 
s390x:
elinks-0.9.2-3.3.5.2.s390x.rpm     MD5: f9d32215514a0c003d315cb8a22305bc
 
x86_64:
elinks-0.9.2-3.3.5.2.x86_64.rpm     MD5: ca4941f6358b9b351285bb7268ee368c
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
elinks-0.11.1-5.1.0.1.el5.src.rpm
File outdated by:  RHSA-2013:0250
    MD5: df97aa87a94550dd9c6b8b3ab4e6f717
 
IA-32:
elinks-0.11.1-5.1.0.1.el5.i386.rpm
File outdated by:  RHSA-2013:0250
    MD5: 7b4b7287bc524c45dc55a702ea6243ea
 
x86_64:
elinks-0.11.1-5.1.0.1.el5.x86_64.rpm
File outdated by:  RHSA-2013:0250
    MD5: 5cd0b473ae6d27f879f48aa2085e6380
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
elinks-0.9.2-3.3.5.2.src.rpm
File outdated by:  RHSA-2009:1471
    MD5: f04cc8143e0eeb2479926cfdd47517bc
 
IA-32:
elinks-0.9.2-3.3.5.2.i386.rpm
File outdated by:  RHSA-2009:1471
    MD5: 740855a258e36afc4bd02b2dc939f6d0
 
IA-64:
elinks-0.9.2-3.3.5.2.ia64.rpm
File outdated by:  RHSA-2009:1471
    MD5: d27d29fc20f082fd5c4e3d16a1f1b96f
 
x86_64:
elinks-0.9.2-3.3.5.2.x86_64.rpm
File outdated by:  RHSA-2009:1471
    MD5: ca4941f6358b9b351285bb7268ee368c
 
Red Hat Enterprise Linux ES (v. 4.5.z)

SRPMS:
elinks-0.9.2-3.3.5.2.src.rpm
File outdated by:  RHSA-2009:1471
    MD5: f04cc8143e0eeb2479926cfdd47517bc
 
IA-32:
elinks-0.9.2-3.3.5.2.i386.rpm     MD5: 740855a258e36afc4bd02b2dc939f6d0
 
IA-64:
elinks-0.9.2-3.3.5.2.ia64.rpm     MD5: d27d29fc20f082fd5c4e3d16a1f1b96f
 
x86_64:
elinks-0.9.2-3.3.5.2.x86_64.rpm     MD5: ca4941f6358b9b351285bb7268ee368c
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
elinks-0.9.2-3.3.5.2.src.rpm
File outdated by:  RHSA-2009:1471
    MD5: f04cc8143e0eeb2479926cfdd47517bc
 
IA-32:
elinks-0.9.2-3.3.5.2.i386.rpm
File outdated by:  RHSA-2009:1471
    MD5: 740855a258e36afc4bd02b2dc939f6d0
 
IA-64:
elinks-0.9.2-3.3.5.2.ia64.rpm
File outdated by:  RHSA-2009:1471
    MD5: d27d29fc20f082fd5c4e3d16a1f1b96f
 
x86_64:
elinks-0.9.2-3.3.5.2.x86_64.rpm
File outdated by:  RHSA-2009:1471
    MD5: ca4941f6358b9b351285bb7268ee368c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

297611 - CVE-2007-5034 elinks reveals POST data to HTTPS proxy


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/