The build_index_from_tree function in index.py in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a commit with a directory path starting with .git/, which is not properly handled when checking out a working tree.
References
Configurations
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154523.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154551.html - | |
References | () http://www.debian.org/security/2015/dsa-3206 - | |
References | () http://www.openwall.com/lists/oss-security/2015/03/21/1 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2015/03/22/26 - | |
References | () https://git.samba.org/?p=jelmer/dulwich.git%3Ba=commitdiff%3Bh=091638be3c89f46f42c3b1d57dc1504af5729176 - | |
References | () https://lists.launchpad.net/dulwich-users/msg00827.html - Exploit |
07 Nov 2023, 02:23
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-03-31 14:59
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9706
Mitre link : CVE-2014-9706
CVE.ORG link : CVE-2014-9706
JSON object : View
Products Affected
dulwich_project
- dulwich
debian
- debian_linux
CWE
CWE-19
Data Processing Errors