Summary: | <www-servers/monkeyd-1.5.1: Bypass protected directory by Monkey HTTPD (CVE-2013-2182) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | blueness |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2013/06/14/4 | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2013-06-18 08:52:56 UTC
This has been long fix. See https://github.com/monkey/monkey/issues/92 (In reply to Anthony Basile from comment #1) > This has been long fix. See > Do you know what version it was fixed in, just for completeness, before we close. (In reply to Yury German from comment #2) > (In reply to Anthony Basile from comment #1) > > This has been long fix. See > > > > Do you know what version it was fixed in, just for completeness, before we > close. The commit went in on May 20 and would have been pushed out in 1.5.1. Arches and Maintainer(s), Thank you for your work. GLSA Vote: No NO too, closing. Thanks everyone. |