An arbitrary file access flaw was found in the Elinks SMB protocol handler. A malicious web page could have caused Elinks to read or write files with the permissions of the user running Elinks. (CVE-2006-5925)
http://marc.theaimsgroup.com/?l=full-disclosure&m=116355556512780&w=2 http://secunia.com/advisories/22920/ upstream bug: http://bugzilla.elinks.cz/show_bug.cgi?id=841 perhaps patches could be extracted from RH update, that was for an older version though, maybe someone could check that out
Red Hat "fixed" the problem by disabling smb support: http://rhn.redhat.com/errata/RHSA-2006-0742.html So did the guy working on the vulnerability in the elinks bugzilla. The bug to watch for the fix is apparently: http://bugzilla.elinks.cz/show_bug.cgi?id=844
this appears to have been "fixed" in 0.11.2 by disabling SMB support http://pasky.or.cz/gitweb.cgi?p=elinks.git;a=commitdiff;h=6f14725204fdd0a5f5a054ad7ab7340cd1ce27cb Bug 841, CVE-2006-5925: Prevent enabling the SMB protocol. src/protocol/smb/smb.c: Added #error directives so that this vulnerable code cannot be accidentally compiled in. features.conf: Disable CONFIG_SMB by default and explain why. configure.in: If the user set CONFIG_SMB in features.conf or --enable-smb in the command line, disable them and warn the user. ____ since the ebuild is in the tree already and stable on several arches, we should go on marking it stable for the others too... www-client/elinks-0.11.2 current KEYWORDS="alpha ~amd64 ~hppa ~mips ~ppc ~ppc64 sparc ~x86 ~x86-fbsd" target KEYWORDS="alpha amd64 hppa ~mips ppc ppc64 sparc x86 ~x86-fbsd"
x86 stable
Stable for HPPA.
removed the samba use flag and amd64 stable.
ppc stable
ppc64 stable. sorry for being late
we issued GLSA 200612-16, so we should have one for links too...
old GLSA 200701-27