-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1226-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff December 3rd, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : links Vulnerability : insufficient escaping Problem-Type : remote Debian-specific: no CVE ID : CVE-2006-5925 Debian Bug : 399187 Teemu Salmela discovered that the links character mode web browser performs insufficient sanitising of smb:// URIs, which might lead to the execution of arbitrary shell commands. For the stable distribution (sarge) this problem has been fixed in version 0.99+1.00pre12-1sarge1. For the upcoming stable distribution (etch) this problem has been fixed in version 0.99+1.00pre12-1.1. For the unstable distribution (sid) this problem has been fixed in version 0.99+1.00pre12-1.1. We recommend that you upgrade your links package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1.dsc Size/MD5 checksum: 628 a1ac1c1549a102a35398b6453df8cf03 http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1.diff.gz Size/MD5 checksum: 8329 5898f75988aba793e9559295996289ef http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12.orig.tar.gz Size/MD5 checksum: 597848 c262b08c822a582bbc992e3730f43336 Architecture independent components: http://security.debian.org/pool/updates/main/l/links/links-ssl_0.99+1.00pre12-1sarge1_all.deb Size/MD5 checksum: 5460 d983ff06f50743eefc590e13b881c649 Alpha architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_alpha.deb Size/MD5 checksum: 441038 6d3f4dbcdb63455d1a7c6c573c0a2cb0 AMD64 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_amd64.deb Size/MD5 checksum: 396200 13443385aff64d07c142561684d3698d ARM architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_arm.deb Size/MD5 checksum: 376692 90dc38882cee571a605ea4c1b312101f HP Precision architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_hppa.deb Size/MD5 checksum: 416286 1a0e7cd0c9885a5a47f89feecdeea13a Intel IA-32 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_i386.deb Size/MD5 checksum: 385186 a99be183941d62c33bd7d0f49c1856cb Intel IA-64 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_ia64.deb Size/MD5 checksum: 524446 e68877303d408b3b730e703c6d78f709 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_m68k.deb Size/MD5 checksum: 343786 51765dbe4d8788b4f4219c6f71461579 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_mips.deb Size/MD5 checksum: 412208 f3272fc9e06d0ad0bed4c2d2816502fe Little endian MIPS architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_mipsel.deb Size/MD5 checksum: 408254 70f5c450fd225ea6a82befeb3d6aeeab PowerPC architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_powerpc.deb Size/MD5 checksum: 396926 b0cbccacc3632be2d3eb97cea74ea6d8 IBM S/390 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_s390.deb Size/MD5 checksum: 390546 2def4e695f30d34bb03a0592f5deee5b Sun Sparc architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_sparc.deb Size/MD5 checksum: 379836 be1bae25603d4a50cf854a6b6b075960 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFczECXm3vHE4uyloRAnygAJwJea6TheWExHFK0nH5A5rbWDG3ygCgmbfu 5P76B0rdqS+zzIEMonB9cWU= =Hj9Z -----END PGP SIGNATURE-----