{"id":"CVE-2014-9706","details":"The build_index_from_tree function in index.py in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a commit with a directory path starting with .git/, which is not properly handled when checking out a working tree.","aliases":["GHSA-4j5j-58j7-6c3w","PYSEC-2015-34"],"modified":"2026-02-04T04:40:29.018458Z","published":"2015-03-31T14:59:04Z","related":["MGASA-2015-0157"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3206"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2015/03/21/1"},{"type":"EVIDENCE","url":"https://lists.launchpad.net/dulwich-users/msg00827.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154523.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154551.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/03/22/26"},{"type":"WEB","url":"https://git.samba.org/?p=jelmer/dulwich.git%3Ba=commitdiff%3Bh=091638be3c89f46f42c3b1d57dc1504af5729176"}],"schema_version":"1.7.3"}