Description: "Relative Path Traversal in Babel 2.9.0 allows an attacker to load arbitrary locale files on disk and execute arbitrary code." Disclosure: https://www.tenable.com/security/research/tra-2021-14
ALLARCHES stable. Closing.
Please cleanup (In reply to Agostino Sarubbo from comment #1) > ALLARCHES stable. Closing. It’s a security bug! ;)
Already done.
GLSA request filed.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=f6e2e11e7ff841fcf8e693775058b96ef4b3e7b1 commit f6e2e11e7ff841fcf8e693775058b96ef4b3e7b1 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2022-08-04 13:53:26 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2022-08-04 13:59:54 +0000 [ GLSA 202208-03 ] Babel: Remote code execution Bug: https://bugs.gentoo.org/786954 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: John Helmert III <ajak@gentoo.org> glsa-202208-03.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+)
GLSA released, all done!