Summary: | <app-admin/bcfg2-{1.2.0_rc2,1.1.3}: Shell Command Injection (CVE-2011-3211) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | alexanderyt, mjinks, xmw |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://github.com/solj/bcfg2/commit/f4a35efec1b6a1e54d61cf1b8bfc83dd1d89eef7 | ||
See Also: | http://bugs.debian.org/640028 | ||
Whiteboard: | ~1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Alex Legler (RETIRED)
2011-09-02 10:55:06 UTC
CVE-2011-3211 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3211): The server in Bcfg2 1.1.2 and earlier, and 1.2 prerelease, allows remote attackers to execute arbitrary commands via shell metacharacters in data received from a client. +*bcfg2-1.2.0_rc2 (11 Nov 2011) +*bcfg2-1.1.3 (11 Nov 2011) + + 11 Nov 2011; Michael Weber <xmw@gentoo.org> -bcfg2-1.1.0.ebuild, + -bcfg2-1.1.2.ebuild, +bcfg2-1.1.3.ebuild, +bcfg2-1.2.0_rc2.ebuild: + Version bump to address security issues (bug 381543) + Thanks, folks. Closing noglsa. |