An arbitrary file access flaw was found in the Elinks SMB protocol handler.
A malicious web page could have caused Elinks to read or write files with
the permissions of the user running Elinks. (CVE-2006-5925)
upstream bug: http://bugzilla.elinks.cz/show_bug.cgi?id=841
perhaps patches could be extracted from RH update, that was for an older version though, maybe someone could check that out
Red Hat "fixed" the problem by disabling smb support:
So did the guy working on the vulnerability in the elinks bugzilla. The bug to watch for the fix is apparently:
this appears to have been "fixed" in 0.11.2 by disabling SMB support
Bug 841, CVE-2006-5925: Prevent enabling the SMB protocol.
src/protocol/smb/smb.c: Added #error directives so that this
vulnerable code cannot be accidentally compiled in.
features.conf: Disable CONFIG_SMB by default and explain why.
configure.in: If the user set CONFIG_SMB in features.conf or
--enable-smb in the command line, disable them and warn the user.
since the ebuild is in the tree already and stable on several arches, we should go on marking it stable for the others too...
current KEYWORDS="alpha ~amd64 ~hppa ~mips ~ppc ~ppc64 sparc ~x86 ~x86-fbsd"
target KEYWORDS="alpha amd64 hppa ~mips ppc ppc64 sparc x86 ~x86-fbsd"
Stable for HPPA.
removed the samba use flag
and amd64 stable.
ppc64 stable. sorry for being late
we issued GLSA 200612-16, so we should have one for links too...
old GLSA 200701-27