Your message dated Wed, 25 Oct 2017 23:45:39 +0200
with message-id
<cakjshr1p9w6jwwt1y93d6hos0+zzc8-hgwzu97cn92otwag...@mail.gmail.com>
and subject line curl/CVE-2017-1000254 fixed in unstable
has caused the Debian Bug report #877671,
regarding curl: CVE-2017-1000254: FTP PWD response parser out of bounds read
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
877671: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: curl
Version: 7.38.0-4
Severity: important
Tags: security patch upstream fixed-upstream
Hi,
the following vulnerability was published for curl, filling for
reference, Alessandro is aware.
CVE-2017-1000254[0]:
FTP PWD response parser out of bounds read
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-1000254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
[1] https://curl.haxx.se/docs/adv_20171004.html
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Version: 7.56.1-1
--- End Message ---