| Summary: | nmap new security issue CVE-2018-15173 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, guillomovitch, herman.viaene, marja11, sysadmin-bugs, tmb |
| Version: | 7 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA7-64-OK | ||
| Source RPM: | nmap-7.70-2.mga7.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2019-08-11 18:29:28 CEST
Assigning to our registered nmap maintainer. CC:
(none) =>
marja11 I just submitted nmap-7.70-2.1.mga7, fixing the issue, in updates_testing.
Guillaume Rousse
2019-10-13 17:24:09 CEST
Assignee:
guillomovitch =>
qa-bugs Advisory: ======================== Updated nmap packages fix security vulnerability: Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service (CVE-2018-15173). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15173 https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00067.html ======================== Updated packages in core/updates_testing: ======================== nmap-7.70-2.1.mga7 nmap-frontend-7.70-2.1.mga7 from nmap-7.70-2.1.mga7.src.rpm CC:
(none) =>
guillomovitch MGA7-64 Plasma on Lenovo B50. No installation issues Ran nmapfe and xnmap, which both seem to point to zenmap. Ran a few scans of this laptop and my desktop PC.Seems OK. CC:
(none) =>
herman.viaene Validating. Advisory in Comment 3. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Thomas Backlund
2019-10-16 23:14:17 CEST
Keywords:
(none) =>
advisory An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0294.html Resolution:
(none) =>
FIXED |