Summary: | dev-python/cherrypy < 3.0.2-r1 Directory traversal via malicious cookie (CVE-2008-0252) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | python |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/28354/ | ||
Whiteboard: | C2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() cherrypy-3.0.2-r1 includes upstream fix. I want to drop cherrypy-2.* as soon as this one has enough keywords. Arches, please test and mark stable dev-python/cherrypy-3.0.2-r1. Target keywords : "ia64 x86" We also need 2.2 updated as at least turbogears needs it ia64/x86 stable (In reply to comment #3) > We also need 2.2 updated as at least turbogears needs it > Thanks for reminding. cherrypy-2.2-r2 has the backported patch. I've also fixed the tests for python-2.5 and dropped old versions. Target keywords for this version are ia64 and x86 as well. Thanks a lot. Arches, here you go again. ia64/x86 stable voting time. I vote YES. This probably allows writing files outside of the session directory. Definately YES. GLSA 200801-11, thanks. |