" [NSE][SECURITY] Nmap developer nnposter found a security flaw (directory traversal vulnerability) in the way the non-default http-fetch script sanitized URLs. If a user manualy ran this NSE script with against a malicious web server, the server could potentially (depending on NSE arguments used) cause files to be saved outside the intended destination directory. Existing files couldn't be overwritten. We fixed http-fetch, audited our other scripts to ensure they didn't make this mistake, and we updated the httpspider library API to protect against this by default. [nnposter, Daniel Miller] " https://nmap.org/changelog#7.70
Arch teams, please test and mark stable: =net-analyzer/nmap-7.70 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
amd64 stable
ia64 stable
hppa stable
commit 639b423b1c6c8d08a6f52041285bf531d7099478 Author: Rolf Eike Beer <eike@sf-mail.de> Date: Thu Mar 22 18:09:29 2018 +0100 net-analyzer/nmap: stable 7.70 for sparc, bug #651118
x86 stable
Stable on alpha.
ppc/ppc64 stable
arm stable, all arches done.
GLSA Vote: No @maintainer(s), please drop the vulnerable versions.
tree is clean