Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 30 Jun 2008 09:47:19 +0200
From: Steffen Joeris <steffen.joeris@...lelinux.de>
To: oss-security@...ts.openwall.com
Subject: CVE id request mercurial:Insufficient input validation

Hi

Moving this to oss-sec, since it is unembargoed.

It is possible to touch files outside root with a maliciously crafted
patch.

Upstream patch:
http://www.selenic.com/hg/rev/87c704ac92d4

Cheers
Steffen

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ