The build_index_from_tree function in index.py in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a commit with a directory path starting with .git/, which is not properly handled when checking out a working tree.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
http://www.debian.org/security/2015/dsa-3206 | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154551.html | vendor advisory |
https://git.samba.org/?p=jelmer/dulwich.git%3Ba=commitdiff%3Bh=091638be3c89f46f42c3b1d57dc1504af5729176 | |
http://www.openwall.com/lists/oss-security/2015/03/22/26 | mailing list |
http://www.openwall.com/lists/oss-security/2015/03/21/1 | mailing list exploit |
https://lists.launchpad.net/dulwich-users/msg00827.html | mailing list exploit |
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154523.html | vendor advisory |