[USN-2292-1] LWP::Protocol::https vulnerability

Type securityvulns
Reporter Securityvulns
Modified 2014-07-21T00:00:00


========================================================================== Ubuntu Security Notice USN-2292-1 July 17, 2014

liblwp-protocol-https-perl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS


LWP::Protocol::https could be made to expose sensitive information over the network.

Software Description: - liblwp-protocol-https-perl: HTTPS driver for LWP::UserAgent


It was discovered that the LWP::Protocol::https perl module incorrectly disabled peer certificate verification completely when only hostname verification was requested to be disabled. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could possibly be exploited in certain scenarios to alter or compromise confidential information in applications that used the LWP::Protocol::https module.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS: liblwp-protocol-https-perl 6.04-2ubuntu0.1

In general, a standard system update will make all the necessary changes.

References: http://www.ubuntu.com/usn/usn-2292-1 CVE-2014-3230

Package Information: https://launchpad.net/ubuntu/+source/liblwp-protocol-https-perl/6.04-2ubuntu0.1

-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce