Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 386321 (CVE-2011-1572) - <dev-vcs/gitolite-1.5.9.1: library loading path vulnerability (CVE-2011-1572)
Summary: <dev-vcs/gitolite-1.5.9.1: library loading path vulnerability (CVE-2011-1572)
Status: RESOLVED FIXED
Alias: CVE-2011-1572
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-10-08 14:16 UTC by GLSAMaker/CVETool Bot
Modified: 2014-12-12 00:38 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 14:16:55 UTC
CVE-2011-1572 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1572):
  Directory traversal vulnerability in the Admin Defined Commands (ADC)
  feature in gitolite before 1.5.9.1 allows remote attackers to execute
  arbitrary commands via .. (dot dot) sequences in admin-defined commands.
Comment 1 Stefan Behte (RETIRED) gentoo-dev Security 2011-10-08 14:20:20 UTC
GLSA request filed.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2014-12-12 00:38:45 UTC
This issue was resolved and addressed in
 GLSA 201412-09 at http://security.gentoo.org/glsa/glsa-201412-09.xml
by GLSA coordinator Sean Amoss (ackle).