File _patchinfo of Package patchinfo.17511
<patchinfo incident="17511"> <issue tracker="bnc" id="1082814">VUL-0: CVE-2012-6709 elinks: Does not properly verify SSL certificates</issue> <issue tracker="cve" id="2012-6709"></issue> <packager>sbrabec</packager> <rating>moderate</rating> <category>recommended</category> <summary>Recommended update for elinks</summary> <description>This update for elinks fixes the following issues: Update to elinks 20190723 snapshot of version 0.13. Update to version 0.13: * parse_header: document parameters and return value * doxygen: Fix link to bookmark::url * use draw_text for titles * iconv: Bail out of the loop when an illegal sequence of bytes occur * Add support for the CSS list-style-type property * Fixed problem of converting more than 256 chars * mem_free_if where aplicable * ssl: Make RAND_egd optional * Better handling of content-disposition * display lua hooks errors * brotli code updated * Use blacklist to skip verification of certificates * various code cleanup * -VERS-SSL3.0 in gnutls to avoid SSL error. * 1024: Verify server certificate hostname with OpenSSL (boo#1082814) </description> </patchinfo>