Secunia Security Advisory - Debian has issued an update for elinks. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.
92b6a149db8d6d43e2b3705b5d7ccdbf281b68be51a206cefea1814c781ca677
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Debian update for elinks
SECUNIA ADVISORY ID:
SA36933
VERIFY ADVISORY:
http://secunia.com/advisories/36933/
DESCRIPTION:
Debian has issued an update for elinks. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a user's system.
For more information:
SA36910
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2.diff.gz
Size/MD5 checksum: 30564 48727476dbfed45200797a0504fa6e4a
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1.orig.tar.gz
Size/MD5 checksum: 3863617 dce0fa7cb2b6e7194ddd00e34825218b
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2.dsc
Size/MD5 checksum: 872 870acbbc16c166c0e17669f435cf4478
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_alpha.deb
Size/MD5 checksum: 496748 65a9e90caf0005912d0f307447bb7252
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_alpha.deb
Size/MD5 checksum: 1264746 750b9c9425d331afdd84ae9e8ec397cc
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_amd64.deb
Size/MD5 checksum: 457658 d35d0729240a9a3e4edf596fab8b5519
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_amd64.deb
Size/MD5 checksum: 1219062 eeb677af4bd1f969062dcc49a6c5797f
arm architecture (ARM)
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_arm.deb
Size/MD5 checksum: 1179258 2236eef0018c35106157254f1a9b5371
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_arm.deb
Size/MD5 checksum: 417026 d6298439e61cfd390dc5f885fa6d3ce9
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_hppa.deb
Size/MD5 checksum: 1249718 200ea460bf1c50c7c77fb818b99d6f93
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_hppa.deb
Size/MD5 checksum: 481296 4d1ffd49415dc0f727fec71843e0cf1e
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_i386.deb
Size/MD5 checksum: 423782 fd2bdd5f8d85049dd34e9d392cfb0d55
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_i386.deb
Size/MD5 checksum: 1188386 6b5bd5cc0801cc98c5f89eb755036a58
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_ia64.deb
Size/MD5 checksum: 1432996 3f1c8fd354685e153aa0bf6001811f72
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_ia64.deb
Size/MD5 checksum: 624264 6ab1d3d6329c2fbbd366c7979846be04
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_mipsel.deb
Size/MD5 checksum: 1223924 88dab6a6625382e7d7531f9f45f2fb6d
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_mipsel.deb
Size/MD5 checksum: 466916 3f54531dc562935768748e8626c3cd8a
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_powerpc.deb
Size/MD5 checksum: 450082 4cb3cbeda69cd02ddc99b132d26998c5
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_powerpc.deb
Size/MD5 checksum: 1216856 ed85e75381a7bfdd094e21e0e16ecbfd
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_s390.deb
Size/MD5 checksum: 1232366 5eafbb1dcf688fe54bd347afab8d6da8
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_s390.deb
Size/MD5 checksum: 470580 9da53a0cc795e3943c250a44810f006d
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.11.1-1.2etch2_sparc.deb
Size/MD5 checksum: 419686 6177d561615f0c17f9e46e3642899870
http://security.debian.org/pool/updates/main/e/elinks/elinks_0.11.1-1.2etch2_sparc.deb
Size/MD5 checksum: 1186370 1f7db95ad501df7b756e3ccaf2dc754d
ORIGINAL ADVISORY:
DSA-1902-1:
http://www.debian.org/security/2009/dsa-1902
OTHER REFERENCES:
SA36910:
http://secunia.com/advisories/36910/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------