Debian: DSA-1777-1: New git-core packages fix privilege escalation

    Date21 Apr 2009
    CategoryDebian
    28
    Posted ByLinuxSecurity Advisories
    Peter Palfrader discovered that in the Git revision control system, on some architectures files under /usr/share/git-core/templates/ were owned by a non-root user. This allows a user with that uid on the local system to write to these files and possibly escalate their privileges.
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1777-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                          Thijs Kinkhorst
    April 21, 2009                        http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : git-core
    Vulnerability  : file permission error
    Problem type   : local
    Debian-specific: yes
    Debian Bug     : 516669
    
    Peter Palfrader discovered that in the Git revision control system,
    on some architectures files under /usr/share/git-core/templates/ were
    owned by a non-root user. This allows a user with that uid on the local
    system to write to these files and possibly escalate their privileges.
    
    This issue only affects the DEC Alpha and MIPS (big and little endian)
    architectures.
    
    For the old stable distribution (etch), this problem has been fixed in
    version 1.4.4.4-4+etch2.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 1.5.6.5-3+lenny1.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 1.6.2.1-1.
    
    We recommend that you upgrade your git-core package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2.dsc
        Size/MD5 checksum:      805 2693d7024a52e175ea62eaff3c07a61a
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2.diff.gz
        Size/MD5 checksum:    71107 34ad45133052ce77f2f803554aa9dda1
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4.orig.tar.gz
        Size/MD5 checksum:  1054130 99bc7ea441226f792b6f796a838e7ef0
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/g/git-core/git-arch_1.4.4.4-4+etch2_all.deb
        Size/MD5 checksum:    68960 6ceed58c872080f324ca8a662fefda8c
      http://security.debian.org/pool/updates/main/g/git-core/git-doc_1.4.4.4-4+etch2_all.deb
        Size/MD5 checksum:   466672 3a557c1e51a90e0278d5d1a249f5da57
      http://security.debian.org/pool/updates/main/g/git-core/git-daemon-run_1.4.4.4-4+etch2_all.deb
        Size/MD5 checksum:    55782 c31f96adaa78b22f0066c936909f75c8
      http://security.debian.org/pool/updates/main/g/git-core/gitweb_1.4.4.4-4+etch2_all.deb
        Size/MD5 checksum:    88466 d4f2fe54f9fa94ac65ad23bcd0a262d1
      http://security.debian.org/pool/updates/main/g/git-core/git-svn_1.4.4.4-4+etch2_all.deb
        Size/MD5 checksum:   101018 896a41a4a8c301e47e584617ea1c2f4e
      http://security.debian.org/pool/updates/main/g/git-core/gitk_1.4.4.4-4+etch2_all.deb
        Size/MD5 checksum:    99756 ac00ea6de16a1aa34539f2381d02722e
      http://security.debian.org/pool/updates/main/g/git-core/git-cvs_1.4.4.4-4+etch2_all.deb
        Size/MD5 checksum:    94168 8470e1691d1733cb7b172b1ad68bfe6a
      http://security.debian.org/pool/updates/main/g/git-core/git-email_1.4.4.4-4+etch2_all.deb
        Size/MD5 checksum:    63252 3bc6980242c54684b97918195cb04420
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_alpha.deb
        Size/MD5 checksum:  3088136 abc602dba99ef25f760a355a54e069c6
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_amd64.deb
        Size/MD5 checksum:  2642492 0e3cafc333d0afd1c9a4e30766411cfc
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_arm.deb
        Size/MD5 checksum:  2320802 1254025ebc1e95ce11292e38b06798ee
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_hppa.deb
        Size/MD5 checksum:  2694116 c866ee375a5d459fc165ae195348023c
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_i386.deb
        Size/MD5 checksum:  2353376 38737a48d77b9f5ee8ff5f818b27649e
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_ia64.deb
        Size/MD5 checksum:  3815820 c184bf1ea1d53d995b5ff10383660642
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_mips.deb
        Size/MD5 checksum:  2784232 abbbd45333878d3a3c1e93bc561135fd
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_mipsel.deb
        Size/MD5 checksum:  2801396 824d5a6c8a586ddbe195abdf260d839d
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_powerpc.deb
        Size/MD5 checksum:  2639158 1cac055c562efeb9283dd86d5393c1a5
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_s390.deb
        Size/MD5 checksum:  2628128 b23f89843f3d8131ac8137e12fc6bed9
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.4.4.4-4+etch2_sparc.deb
        Size/MD5 checksum:  2301568 8f7792ade4bbca99ce3bf7677fb14560
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5.orig.tar.gz
        Size/MD5 checksum:  2103619 c22da91c913a02305fd8a1a2298f75c9
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1.dsc
        Size/MD5 checksum:     1331 d71b5b45cf6267c99294e91f6991a11b
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1.diff.gz
        Size/MD5 checksum:   226400 b448283f2944fb6908594ba8f55a5f41
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/g/git-core/git-arch_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:   230864 c7853c3b4d671d79b4a0fb25289236bf
      http://security.debian.org/pool/updates/main/g/git-core/gitweb_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:   267878 fac3a5791789b1fec762ff32ac073a8b
      http://security.debian.org/pool/updates/main/g/git-core/git-daemon-run_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:   217632 f06add8050805c4e59be0c7bd59c50d2
      http://security.debian.org/pool/updates/main/g/git-core/git-cvs_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:   267052 b9053e17ea5473d642f4307e5dc8a320
      http://security.debian.org/pool/updates/main/g/git-core/gitk_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:   298458 e0aebaff07db768f83d81ec9fa143847
      http://security.debian.org/pool/updates/main/g/git-core/git-svn_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:   268096 6d6c2c3e675885f0b958103983fd7446
      http://security.debian.org/pool/updates/main/g/git-core/git-doc_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:  1076590 9cc1a31a802041e55ab3f7560acbf547
      http://security.debian.org/pool/updates/main/g/git-core/git-email_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:   229144 f545c11bf21e4e4069a5197da7c2c48f
      http://security.debian.org/pool/updates/main/g/git-core/git-gui_1.5.6.5-3+lenny1_all.deb
        Size/MD5 checksum:   401374 a1511118ee3c1c379dfb98be35899514
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_alpha.deb
        Size/MD5 checksum:  3821086 cfeccb787aa6e4d001ca5042941397cf
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_amd64.deb
        Size/MD5 checksum:  3426768 aa6418c7300e3851d13d0cb1549c1fa2
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_arm.deb
        Size/MD5 checksum:  3045298 1156c20c95f6e392531a763617a6b3e7
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_armel.deb
        Size/MD5 checksum:  3067946 3d901082ec012f7507240117225fc884
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_hppa.deb
        Size/MD5 checksum:  3163726 0ed1cad303007ecb1afa7bda475cbc97
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_i386.deb
        Size/MD5 checksum:  3138600 eeb82eadf948b5da722fbe23eeabb86b
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_ia64.deb
        Size/MD5 checksum:  4759030 340622fbc09e9e914d666a7ae1092434
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_mips.deb
        Size/MD5 checksum:  3419126 1bbb25d016b3d76ae020e9f58a9199c7
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_mipsel.deb
        Size/MD5 checksum:  3420520 5ebe827bea6baad8b6860d3ca0ce9925
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_powerpc.deb
        Size/MD5 checksum:  3473356 6ffb59e850de883cfaa581f6b7caef19
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_s390.deb
        Size/MD5 checksum:  3411104 7d4389b212da668bfe175f7456d47761
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/g/git-core/git-core_1.5.6.5-3+lenny1_sparc.deb
        Size/MD5 checksum:  3079872 dab8f44b47dc73865c0d83a223801e6e
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.