FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  351541
Date:      2014-04-18
Time:      14:56:43Z
Committer: ohauer

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
f94befcd-1289-11e2-a25e-525400272390gitolite -- path traversal vulnerability

Sitaram Chamarty reports:

I'm sorry to say there is a potential path traversal vulnerability in v3. Thanks to Stephane Chazelas for finding it and alerting me.

Can it affect you? This can only affect you if you are using wild card repos, *and* at least one of your patterns allows the string "../" to match multiple times.

How badly can it affect you? A malicious user who *also* has the ability to create arbitrary files in, say, /tmp (e.g., he has his own userid on the same box), can compromise the entire "git" user. Otherwise the worst he can do is create arbitrary repos in /tmp.


Discovery 2012-10-09
Entry 2012-10-15
gitolite
ge 3.01 le 3.04

https://groups.google.com/forum/#!topic/gitolite/K9SnQNhCQ-0/discussion
f94befcd-1289-11e2-a25e-525400272390gitolite -- path traversal vulnerability

Sitaram Chamarty reports:

I'm sorry to say there is a potential path traversal vulnerability in v3. Thanks to Stephane Chazelas for finding it and alerting me.

Can it affect you? This can only affect you if you are using wild card repos, *and* at least one of your patterns allows the string "../" to match multiple times.

How badly can it affect you? A malicious user who *also* has the ability to create arbitrary files in, say, /tmp (e.g., he has his own userid on the same box), can compromise the entire "git" user. Otherwise the worst he can do is create arbitrary repos in /tmp.


Discovery 2012-10-09
Entry 2012-10-15
gitolite
ge 3.01 le 3.04

https://groups.google.com/forum/#!topic/gitolite/K9SnQNhCQ-0/discussion
f94befcd-1289-11e2-a25e-525400272390gitolite -- path traversal vulnerability

Sitaram Chamarty reports:

I'm sorry to say there is a potential path traversal vulnerability in v3. Thanks to Stephane Chazelas for finding it and alerting me.

Can it affect you? This can only affect you if you are using wild card repos, *and* at least one of your patterns allows the string "../" to match multiple times.

How badly can it affect you? A malicious user who *also* has the ability to create arbitrary files in, say, /tmp (e.g., he has his own userid on the same box), can compromise the entire "git" user. Otherwise the worst he can do is create arbitrary repos in /tmp.


Discovery 2012-10-09
Entry 2012-10-15
gitolite
ge 3.01 le 3.04

https://groups.google.com/forum/#!topic/gitolite/K9SnQNhCQ-0/discussion