SHARE
Facebook X Pinterest WhatsApp

Advisories, December 5, 2006

Written By
thumbnail
Web Webster
Web Webster
Dec 6, 2006

Debian Security Advisory DSA 1228-1 security@debian.org
http://www.debian.org/security/
Moritz Muehlenhoff
December 5th, 2006 http://www.debian.org/security/faq


Package : elinks
Vulnerability : insufficient escaping
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-5925
Debian Bug : 399188

Teemu Salmela discovered that the elinks character mode web
browser performs insufficient sanitising of smb:// URIs, which
might lead to the execution of arbitrary shell commands.

For the stable distribution (sarge) this problem has been fixed
in version 0.10.4-7.1.

For the upcoming stable distribution (etch) this problem has
been fixed in version 0.11.1-1.2.

For the unstable distribution (sid) this problem has been fixed
in version 0.11.1-1.2.

We recommend that you upgrade your elinks package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1.dsc

      Size/MD5 checksum: 855
f57923819fa4fce0caca333fb49a08cb
    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1.diff.gz

      Size/MD5 checksum: 25157
611bbe8d6abbdec32944915213b3ffea
    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4.orig.tar.gz

      Size/MD5 checksum: 3533243
d97d1755f9553a3f5c68a3fe420c6a7c

Alpha architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_alpha.deb

      Size/MD5 checksum: 1439074
2db129d65122955bd31c6a62700f0843
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_alpha.deb

      Size/MD5 checksum: 764102
0654e01c0d5ee49ddb8d24e01d4bd220

AMD64 architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_amd64.deb

      Size/MD5 checksum: 1364322
aa61b139f250715d1e9cb1725bfa7938
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_amd64.deb

      Size/MD5 checksum: 706090
18b9ebad31887943c0f54aebd0b355d6

ARM architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_arm.deb

      Size/MD5 checksum: 1314146
21885ec226e0eef970c24d0bda2c087c
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_arm.deb

      Size/MD5 checksum: 664026
f7c2193f6a4a68a090aabafdb7297d1b

HP Precision architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_hppa.deb

      Size/MD5 checksum: 1376592
3cda3866a1e2fcf13e702e789ed075df
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_hppa.deb

      Size/MD5 checksum: 714314
9e491abd147dc046a3702269d9cd0d1b

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_i386.deb

      Size/MD5 checksum: 1325060
0c438d6afad2fbd82f37fb2a92d2e109
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_i386.deb

      Size/MD5 checksum: 671640
d448bedeaefc0de24d256a862401da14

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_ia64.deb

      Size/MD5 checksum: 1536618
c68927923c69e4d51e35df3bbca94736
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_ia64.deb

      Size/MD5 checksum: 838730
9b10a09bb38f156ab2392774e123ca34

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_m68k.deb

      Size/MD5 checksum: 1282356
ce4945f7b57906ee710bc0fb1fc23d04
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_m68k.deb

      Size/MD5 checksum: 639332
7e01f8968d3d7c3539164bcd5ddfe390

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_mips.deb

      Size/MD5 checksum: 1368274
72ad629b2802e1027517694a38c923e2
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_mips.deb

      Size/MD5 checksum: 711436
8fc708e7101e00c668ba06247f851012

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_mipsel.deb

      Size/MD5 checksum: 1365494
de193ce83bc57ee5544410d306d563c4
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_mipsel.deb

      Size/MD5 checksum: 709948
5f8a7bfba56f7c99f2318f7cb4bde8bb

PowerPC architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_powerpc.deb

      Size/MD5 checksum: 1351744
9fb15425d622021fc9d5aeb23a70077d
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_powerpc.deb

      Size/MD5 checksum: 692324
dc7a80d14cd4ec9b9f0ad66a0ff4d9ec

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_s390.deb

      Size/MD5 checksum: 1358028
f2d57e3e90678e07239b24c76462e3e4
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_s390.deb

      Size/MD5 checksum: 707938
488e81b960f0cb8521e59d043039e6df

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_sparc.deb

      Size/MD5 checksum: 1328470
f1430b94811c29d5e05ec9166d73884b
    http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_sparc.deb

      Size/MD5 checksum: 672116
5db368ec717809649fe9c6cc590a0eb6

These files will probably be moved into the stable distribution
on its next update.


For apt-get: deb http://security.debian.org/
stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>;

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.