Bug 741268 - CVE-2011-3761 php-nusoap: Installation path disclosure via a direct request to a .php file [epel-5]
Summary: CVE-2011-3761 php-nusoap: Installation path disclosure via a direct request t...
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: php-nusoap
Version: el5
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: David Nalley
QA Contact: Fedora Extras Quality Assurance
Whiteboard: fst_owner=siddhesh
Depends On:
Blocks: CVE-2011-3761
TreeView+ depends on / blocked
Reported: 2011-09-26 13:04 UTC by Jan Lieskovsky
Modified: 2023-09-14 01:25 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Release Note
Doc Text:
Clone Of:
Last Closed: 2017-04-06 10:26:24 UTC
Type: ---

Attachments (Terms of Use)

Description Jan Lieskovsky 2011-09-26 13:04:41 UTC
epel-5 tracking bug for php-nusoap: see blocks bug list for full details of the security issue(s).

This bug is never intended to be made public, please put any public notes
in the 'blocks' bugs.

[bug automatically created by: add-tracking-bugs]

Comment 1 Siddhesh Poyarekar 2014-11-01 07:07:14 UTC
Is there a plan to update the package to fix the flaw?  Looks like the package has been unmaintained here and upstream for some years now.

Comment 2 Fedora End Of Life 2017-04-06 10:26:24 UTC
Fedora EPEL 5 changed to end-of-life (EOL) status on 2017-03-31. Fedora EPEL 5
is no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of Fedora
or Fedora EPEL, please feel free to reopen this bug against that version. If
you are unable to reopen this bug, please file a new report against the current
release. If you experience problems, please add a comment to this bug.

Thank you for reporting this bug and we are sorry it could not be fixed.

Comment 3 Red Hat Bugzilla 2023-09-14 01:25:33 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days

Note You need to log in before you can comment on or make changes to this bug.