---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Ubuntu update for elinks SECUNIA ADVISORY ID: SA37112 VERIFY ADVISORY: http://secunia.com/advisories/37112/ DESCRIPTION: Ubuntu has issued an update for elinks. This fixes some vulnerabilities, which can be exploited by malicious people to expose sensitive information, manipulate data and cause a DoS (Denial of Service). For more information: SA22920 SA36910 SOLUTION: Apply updated packages. -- Ubuntu 6.06 LTS -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4.diff.gz Size/MD5: 32513 2337a42ab88b259360509ca287a7fdb4 http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4.dsc Size/MD5: 746 35c7278a815709ad6049c98eff1e21f9 http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6.orig.tar.gz Size/MD5: 3651428 0243203b9e54cf0cf002fca31244ce79 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4_amd64.deb Size/MD5: 907150 31ade5835f45e514e0c0b1a7dd86cc17 http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.4_amd64.deb Size/MD5: 732642 b8581260f7a96f74a4658367c4589948 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4_i386.deb Size/MD5: 845652 030f2fa6d5e6345322ff9e721a8e6150 http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.4_i386.deb Size/MD5: 683282 433e35cea4c997bab0363c0bdb1b327b powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4_powerpc.deb Size/MD5: 890200 16446dc0b839fc78d335df36fe7515bb http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.4_powerpc.deb Size/MD5: 721242 4e90bc3c72980c0337f5c05a8eb62d69 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.4_sparc.deb Size/MD5: 862772 740ae50cb4c3d0f3ca5ee4c8cf94861d http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.4_sparc.deb Size/MD5: 697860 eb467ca12766aed2c5e7c1da96a3ccff ORIGINAL ADVISORY: USN-851-1: http://www.ubuntu.com/usn/USN-851-1 OTHER REFERENCES: SA22920: http://secunia.com/advisories/22920/ SA36910: http://secunia.com/advisories/36910/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------