Summary: | <net-analyzer/nagios-core-4.2.2: Arbitrary commands execution via shell metacharacters in https URLs | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tomáš Mózes <hydrapolic> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | andrew, creffett, mjo, proxy-maint, sysadmin |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa cve blocked] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 600864 | ||
Bug Blocks: |
Description
Tomáš Mózes
2016-10-26 05:19:10 UTC
I just added the fixed version to the tree, and removed a few older versions that weren't stable anywhere. (In reply to Michael Orlitzky from comment #1) > I just added the fixed version to the tree, and removed a few older versions > that weren't stable anywhere. Thank you Michael. This issue was resolved and addressed in GLSA 201702-26 at https://security.gentoo.org/glsa/201702-26 by GLSA coordinator Thomas Deutschmann (whissi). |