Hi!

Thanks for reporting!

On 12/11/12 20:26, Jann Horn wrote:
> Package: gatling
> Version: 0.12cvs20120114-2
> Severity: grave
> Tags: upstream security
> Justification: user security hole
> 
> gatling 0.12 has two directory traversal vulns (one in the handling of Host 
> headers, one
> in the ftp code) that have been fixed in Gatling 0.13.

Which ones do you mean? (e.g. CVS commits/fixes?) How does it justify
grave/security?

Does it only apply to your just reported use case with CGI+suid root? We
should identify the CVS commits for backporting.

Thanks in advance,

Roland


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to