On Mon, Nov 27, 2006 at 11:35:07 +0100, Martin Schulze wrote:
Julien Cristau wrote:
Hi,
do the security@ people have a DSA in preparation for links and/or
elinks for CVE-2006-5925, or should I prepare a patch for the stable
versions too?
As far as I know, no. Please prepare an
On Mon, Nov 27, 2006 at 02:44:03 +0100, Julien Cristau wrote:
Hi, the attached patch disables support for smb:// URI, and thus fixes
this bug.
An NMU has been uploaded today with the patch I attached to my previous
mail.
Cheers,
Julien
signature.asc
Description: Digital signature
Hello Peter
Have you noticed that you have a release-critical bug here? The
workaround using --disable-smb sounds easy. Do you plan to upload
a new version in the next time or need an NMU?
bye,
-christian-
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble?
tags 399188 patch
kthxbye
On Sat, Nov 18, 2006 at 13:00:55 +0100, Stefan Fritsch wrote:
A vulnerability has been found in elinks:
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed
allows remote attackers to execute arbitrary code via shell
metacharacters in an smb:// URI,
package: elinks
severity: grave
tags: security
A vulnerability has been found in elinks:
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed
allows remote attackers to execute arbitrary code via shell
metacharacters in an smb:// URI, as demonstrated by using PUT and GET
package elinks
forwarded 399188 http://bugzilla.elinks.cz/show_bug.cgi?id=841
quit
Stefan Fritsch [EMAIL PROTECTED] writes:
A vulnerability has been found in elinks:
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed
allows remote attackers to execute arbitrary code via
6 matches
Mail list logo