Re: [SECURITY] [DSA 2807-1] links2 security update
ist online
--
Flo Böhmdorfer
Sat, Nov 30, 2013 at 05:31:58PM +0100
Moritz Muehlenhoff (jmm@debian.org) :
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-2807-1 security@debian.org
> http://www.debian.org/security/ Moritz Muehlenhoff
> November 30, 2013 http://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package : links2
> Vulnerability : integer overflow
> Problem type : remote
> Debian-specific: no
> CVE ID : CVE-2013-6050
>
> Mikulas Patocka discovered an integer overflow in the parsing of HTML
> tables in the Links web browser. This can only be exploited when running
> Links in graphical mode.
>
> For the oldstable distribution (squeeze), this problem has been fixed in
> version 2.3~pre1-1+squeeze2.
>
> For the stable distribution (wheezy), this problem has been fixed in
> version 2.7-1+deb7u1.
>
> For the testing distribution (jessie), this problem has been fixed in
> version 2.8-1.
>
> For the unstable distribution (sid), this problem has been fixed in
> version 2.8-1.
>
> We recommend that you upgrade your links2 packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: http://www.debian.org/security/
>
> Mailing list: debian-security-announce@lists.debian.org
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.15 (GNU/Linux)
>
> iEYEARECAAYFAlKaEsAACgkQXm3vHE4uylo5GQCeK591/fdk5dWM58+llKUkucPA
> WpwAoK4GPo5mEtkKRHCrMrL5eo5tDh4h
> =kVGD
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
> Archive: http://lists.debian.org/20131130163158.GA5375@pisco.westfalen.local
>
Reply to: