Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 537594

Summary: <sys-devel/patch-2.7.3: directory traversal via file rename
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: base-system
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.openwall.com/lists/oss-security/2015/01/24/2
Whiteboard: A4 [noglsa]
Package list:
Runtime testing required: ---
Bug Depends on: 536614    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2015-01-24 20:11:00 UTC
From ${URL} :

There is a directory traversal flaw via file rename.

It was reported to the Debian BTS as #775873[1] and is different from
#775227, which was a directory traversal via symlinks and got
CVE-2015-1196.

 [1] https://bugs.debian.org/775873
 [2] https://savannah.gnu.org/bugs/?44059


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2015-01-27 12:31:28 UTC
This is fixed in =sys-devel/patch-2.7.3. Stabilization of that version is handled in bug #536614.
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2015-03-17 03:52:00 UTC
Maintainer(s), Thank you for you for cleanup.

GLSA Vote: No
Comment 3 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2015-03-17 08:51:16 UTC
GLSA vote: no.

Closing as [noglsa]