Your message dated Mon, 31 Jul 2017 20:48:59 +0200
with message-id <20170731184859.gg4...@sym.noone.org>
has caused the   report #870299,
regarding links: CVE-2017-11114
to be marked as having been forwarded to the upstream software
author(s) Mikulas Patocka <miku...@twibright.com>

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
870299: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870299
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Hi Mikulas,

not sure if you received that bug report already, too.

                Regards, Axel
-- 
 ,''`.  |  Axel Beckert <a...@debian.org>, http://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-    |  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE
--- Begin Message ---
Source: links2
Version: 2.14-2
Severity: grave
Tags: security upstream

Hi,

the following vulnerability was published for links.

CVE-2017-11114[0]:
The put_chars function in html_r.c in Links 2.14 can cause a denial of
service (buffer over-read) via a crafted html file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-11114
[1] http://seclists.org/fulldisclosure/2017/Jul/76

Regards,
Laszlo/GCS

--- End Message ---

Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply via email to