View | Details | Raw Unified | Return to bug 215988 | Differences between
and this patch

Collapse All | Expand All

(-)security/vuxml/vuln.xml (+31 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="f353525a-d8b8-11e6-a071-001e67f15f5a">
62
    <topic>lshell -- Multiple security issues</topic>
63
    <affects>
64
      <package>
65
	<name>lshell</name>
66
	<range><le>0.9.18</le></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>lshell reports:</p>
72
	<blockquote cite="https://github.com/ghantoos/lshell/issues/151">
73
	  <p>The autocomplete feature allows users to list directories, whil they do not have access to those paths (issue #109).</p>
74
	  <p>It is possible to escape lshell if an allowed command can execute an arbitrary non allowed one (issue #122).</p>
75
	  <p>Inappropriate parsing of commands can lead to arbitrary command execution (issue #147, #149, #151).</p>
76
	</blockquote>
77
      </body>
78
    </description>
79
    <references>
80
      <url>https://github.com/ghantoos/lshell/issues/109</url>
81
      <url>https://github.com/ghantoos/lshell/issues/122</url>
82
      <url>https://github.com/ghantoos/lshell/issues/147</url>
83
      <url>https://github.com/ghantoos/lshell/issues/149</url>
84
      <url>https://github.com/ghantoos/lshell/issues/151</url>
85
    </references>
86
    <dates>
87
      <discovery>2015-07-25</discovery>
88
      <entry>2017-01-12</entry>
89
    </dates>
90
  </vuln>
91
61
  <vuln vid="d4c7e9a9-d893-11e6-9b4d-d050996490d0">
92
  <vuln vid="d4c7e9a9-d893-11e6-9b4d-d050996490d0">
62
    <topic>BIND -- multiple vulnerabilities</topic>
93
    <topic>BIND -- multiple vulnerabilities</topic>
63
    <affects>
94
    <affects>

Return to bug 215988