| Summary: | dev-lang/python tarfile Module Directory Traversal and Symlink Vulnerability (CVE-2007-4559) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Matt Fleming (RETIRED) <mjf> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | major | CC: | python |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://secunia.com/advisories/26623/ | ||
| Whiteboard: | A2 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Matt Fleming (RETIRED)
2007-09-02 11:21:30 UTC
CC'ing herd and setting whiteboard status. other versions are affected The list's thread upstream is dead and there's neither a bug nor a commit about this. python, could you follow that up? Upstream bug report is closed and the python documentation was updated: Never extract archives from untrusted sources without prior inspection. It is possible that files are created outside of *path*, e.g. members that have absolute filenames starting with ``"/"`` or filenames with two dots ``".."``. See http://bugs.python.org/issue1044 https://bugzilla.redhat.com/show_bug.cgi?id=263261 We won't see an upstream fix for this issue. In that case I guess we can close this one as INVALID? Sadly, yes. |