CVE-2012-6709

NameCVE-2012-6709
DescriptionELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs510417, 694658, 891575

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
elinks (PTS)jessie0.12~pre6-5vulnerable
stretch0.12~pre6-12vulnerable
buster0.13~20190125-3fixed
bullseye, bookworm0.13.2-1fixed
sid, trixie0.17.0-2fixed
links2 (PTS)jessie2.8-2fixed
stretch2.14-2fixed
buster2.18-2fixed
bullseye2.21-1fixed
bookworm2.28-1fixed
sid, trixie2.29-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
elinkssourceexperimental0.13~20190125-1
elinkssource(unstable)0.13~20190125-3low891575
links2source(unstable)2.6-1510417, 694658

Notes

[stretch] - elinks <ignored> (Minor issue)
[jessie] - elinks <ignored> (Minor issue)
[wheezy] - elinks <ignored> (Minor issue)
Patch proposed upstream (when using): http://lists.linuxfromscratch.org/pipermail/elinks-dev/2015-June/002099.html
tested links2 against badssl.com, no apparent issue back in wheezy
src:links2/2.6-1 adds verify-ssl-certs-510417.diff to verify SSL certs.
src:links2 upstream in 2.11 adds support for verifying SSL certificates.

Search for package or bug name: Reporting problems