Summary: | <net-analyzer/nmap-7.70: directory traversal vulnerability in the way the non-default http-fetch script sanitized URLs | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | netmon |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [noglsa] | ||
Package list: |
net-analyzer/nmap-7.70
|
Runtime testing required: | --- |
Description
Jeroen Roovers (RETIRED)
![]() Arch teams, please test and mark stable: =net-analyzer/nmap-7.70 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 amd64 stable ia64 stable hppa stable commit 639b423b1c6c8d08a6f52041285bf531d7099478 Author: Rolf Eike Beer <eike@sf-mail.de> Date: Thu Mar 22 18:09:29 2018 +0100 net-analyzer/nmap: stable 7.70 for sparc, bug #651118 x86 stable Stable on alpha. ppc/ppc64 stable arm stable, all arches done. GLSA Vote: No @maintainer(s), please drop the vulnerable versions. tree is clean |