Your message dated Mon, 31 Jul 2017 20:48:59 +0200
with message-id <20170731184859.gg4...@sym.noone.org>
has caused the report #870299,
regarding links: CVE-2017-11114
to be marked as having been forwarded to the upstream software
author(s) Mikulas Patocka <miku...@twibright.com>
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
870299: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870299
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Hi Mikulas,
not sure if you received that bug report already, too.
Regards, Axel
--
,''`. | Axel Beckert <a...@debian.org>, http://people.debian.org/~abe/
: :' : | Debian Developer, ftp.ch.debian.org Admin
`. `' | 4096R: 2517 B724 C5F6 CA99 5329 6E61 2FF9 CD59 6126 16B5
`- | 1024D: F067 EA27 26B9 C3FC 1486 202E C09E 1D89 9593 0EDE
--- Begin Message ---
Source: links2
Version: 2.14-2
Severity: grave
Tags: security upstream
Hi,
the following vulnerability was published for links.
CVE-2017-11114[0]:
The put_chars function in html_r.c in Links 2.14 can cause a denial of
service (buffer over-read) via a crafted html file.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-11114
[1] http://seclists.org/fulldisclosure/2017/Jul/76
Regards,
Laszlo/GCS
--- End Message ---
signature.asc
Description: Digital signature
--- End Message ---