Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 553608 - <app-admin/logstash-bin-1.4.3: Directory traversal vulnerability (CVE-2015-4152)
Summary: <app-admin/logstash-bin-1.4.3: Directory traversal vulnerability (CVE-2015-4152)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-29 23:58 UTC by GLSAMaker/CVETool Bot
Modified: 2015-07-01 12:04 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2015-06-29 23:58:27 UTC
CVE-2015-4152 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4152):
  Directory traversal vulnerability in the file output plugin in Elasticsearch
  Logstash before 1.4.3 allows remote attackers to write to arbitrary files
  via vectors related to dynamic field references in the path option.
Comment 1 Ian Delaney (RETIRED) gentoo-dev 2015-07-01 08:05:03 UTC
*logstash-bin-1.4.3 (01 Jul 2015)

  01 Jul 2015; Ian Delaney <idella4@gentoo.org> +logstash-bin-1.4.3.ebuild,
  -logstash-bin-1.4.2.ebuild:
  bump, rm old wrt sec bug #553608
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2015-07-01 12:04:08 UTC
Maintainer(s), Thank you for you for cleanup.

Thank you all. Closing as noglsa.