You are here
Home > Preporuke > Sigurnosni propust programskog paketa liblwp-protocol-https-perl

Sigurnosni propust programskog paketa liblwp-protocol-https-perl

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2292-1
July 17, 2014

liblwp-protocol-https-perl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

LWP::Protocol::https could be made to expose sensitive information over the
network.

Software Description:
– liblwp-protocol-https-perl: HTTPS driver for LWP::UserAgent

Details:

It was discovered that the LWP::Protocol::https perl module incorrectly
disabled peer certificate verification completely when only hostname
verification was requested to be disabled. If a remote attacker were able
to perform a man-in-the-middle attack, this flaw could possibly be
exploited in certain scenarios to alter or compromise confidential
information in applications that used the LWP::Protocol::https module.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
liblwp-protocol-https-perl 6.04-2ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2292-1
CVE-2014-3230

Package Information:
https://launchpad.net/ubuntu/+source/liblwp-protocol-https-perl/6.04-2ubuntu0.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=qTWT
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2014-07-0004-ADV
CveCVE-2014-3230
ID izvornikaUSN-2292-1
Proizvodliblwp-protocol-https-perl
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivosti programskog paketa fail2ban

Otkrivene su dvije ranjivosti u filterima postfix i cyrus-imap unutar Fail2ban na operacijskom sustavu Debian. Ranjivosti napadačima omogućavaju izazivanje blokade...

Close