Control: reassign -1 elinks 0.12~pre5-9

Here's the result of my investigation of this bug in the context of
CVE-2012-6709.

I tested the following domains:

 * https://wrong.host.badssl.com/
 * https://self-signed.badssl.com/
 * https://untrusted-root.badssl.com/

Obviously, there are many more possible problems with certificate
checking, but the "dashboard" page on the badssl.com requires javascript
so it doesn't work in the browsers we're interested in here.

In both Debian stretch and Debian wheezy, links2 (and lynx and w3m, for
what it's worth) correctly warns about those three sites being
incorrectly verified.

elinks, however, fails to fail and loads all three sites without
warning so there's a security issue there.

So i've reassigned this bug to the elinks package and will triage the
CVE correctly in the security tracker.

Attachment: signature.asc
Description: PGP signature

Reply via email to