-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA-1841-1                    security@debian.org
http://www.debian.org/security/                                 Nico Golde
July 25th, 2009                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : git-core
Vulnerability  : denial of service
Problem type   : remote
Debian-specific: no
Debian bug     : 532935
CVE ID         : CVE-2009-2108

It was discovered that git-daemon which is part of git-core, a popular
distributed revision control system, is vulnerable to denial of service
attacks caused by a programming mistake in handling requests containing
extra unrecognized arguments which results in an infinite loop. While
this is no problem for the daemon itself as every request will spawn a
new git-daemon instance, this still results in a very high CPU consumption
and might lead to denial of service conditions.


For the oldstable distribution (etch), this problem has been fixed in
version 1.4.4.4-4+etch3.

For the stable distribution (lenny), this problem has been fixed in
version 1.5.6.5-3+lenny2.

For the testing distribution (squeeze), this problem has been fixed in
version 1:1.6.3.3-1.

For the unstable distribution (sid), this problem has been fixed in
version 1:1.6.3.3-1.


We recommend that you upgrade your git-core packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum:    72125 920daf694b12a77e06f27324c61753fc
      Size/MD5 checksum:  1054130 99bc7ea441226f792b6f796a838e7ef0
      Size/MD5 checksum:      805 9fa69bdac10c46441712bcb97a8a9e65

Architecture independent packages:

      Size/MD5 checksum:    89018 fa846f8c62895984a153dc720139280b
      Size/MD5 checksum:   100788 48ab52e7be61dcb5250ebda54e2d1126
      Size/MD5 checksum:    94996 9233cd5e72daae479d299905eca84128
      Size/MD5 checksum:   572486 87737fc3ae4191051bd2712190f3fc19
      Size/MD5 checksum:    63304 6c558ece1e80966bd662acc67749ac2e
      Size/MD5 checksum:    55908 243dc1bc8acc538e45e2631c97771162
      Size/MD5 checksum:   100154 892b5d12d207102f27db83d24b6178cb
      Size/MD5 checksum:    69016 4b5ddf573ebb0736e967e02a2b355cd3

alpha architecture (DEC Alpha)

      Size/MD5 checksum:  3102126 6275cd993e070350bedcf9733e827da0

amd64 architecture (AMD x86_64 (AMD64))

      Size/MD5 checksum:  2641296 3dff7bca20524d55e6f9bf2323a8afc1

arm architecture (ARM)

      Size/MD5 checksum:  2323022 de2a3964df5fe485a5fb56d009a62dc3

i386 architecture (Intel ia32)

      Size/MD5 checksum:  2353750 97fb3bb60dbe68eeb5aae2604949e85c

ia64 architecture (Intel ia64)

      Size/MD5 checksum:  3815890 4f6f57eb772f523cc243190cec885dc7

mips architecture (MIPS (Big Endian))

      Size/MD5 checksum:  2784346 af422088e354d29ca3c59aba1dba8110

powerpc architecture (PowerPC)

      Size/MD5 checksum:  2654894 4cf6082256ec24bddce89d420920c49c

s390 architecture (IBM S/390)

      Size/MD5 checksum:  2628316 433af991f74293d69fe64a41130def76

sparc architecture (Sun SPARC/UltraSPARC)

      Size/MD5 checksum:  2301672 c79c01e50d773e64a268d2fcebd5385b


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum:   226798 5f4cc4a02e92213b0dad6c82e856ec2f
      Size/MD5 checksum:  2103619 c22da91c913a02305fd8a1a2298f75c9
      Size/MD5 checksum:     1331 b56dfde38fdf7f22cc2e27d744a67e90

Architecture independent packages:

      Size/MD5 checksum:   404642 e1036baa89a84e7162e4d487021f1881
      Size/MD5 checksum:   230828 5caec9b6b0927af9de2df79b840b9d72
      Size/MD5 checksum:   301198 744e6545323dfabf86bedf142e2c8605
      Size/MD5 checksum:   229240 4d8a53527204bc0224869f55a8812209
      Size/MD5 checksum:   268110 e3ad28d153ddaa0bcb56d717139e2e5f
      Size/MD5 checksum:   217726 4d256c215df877a8135f6df1069683e3
      Size/MD5 checksum:   267514 1d05277557024dc82796a24b42519640
      Size/MD5 checksum:  1248188 102d5fa3582d05804a1d16b5d01fb63d
      Size/MD5 checksum:   267328 9f7d38c746eb005ecc286002ddb878df

amd64 architecture (AMD x86_64 (AMD64))

      Size/MD5 checksum:  3427278 286213e394c88ef73638f667dd9ddc01

arm architecture (ARM)

      Size/MD5 checksum:  3045546 e624c48ded4c1c00dacca13e7595b315

i386 architecture (Intel ia32)

      Size/MD5 checksum:  3137530 a7a44faa83126a48803e02722b1cc5db

ia64 architecture (Intel ia64)

      Size/MD5 checksum:  4759194 8bc9a6f73d11bca6818fd6f16ca20033

mips architecture (MIPS (Big Endian))

      Size/MD5 checksum:  3419202 e5ef2e34a07f5b6e1d1ede2184596925

mipsel architecture (MIPS (Little Endian))

      Size/MD5 checksum:  3420668 a39d630c3911e5fdf912f8beb8cb36f5

s390 architecture (IBM S/390)

      Size/MD5 checksum:  3411278 13619ebe267fa193c8530d0466225f41

sparc architecture (Sun SPARC/UltraSPARC)

      Size/MD5 checksum:  3069050 a18eb59eca3198e05a94ee896c71d272


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Debian: DSA-1841-1: New git-core packages fix denial of service

July 25, 2009
It was discovered that git-daemon which is part of git-core, a popular distributed revision control system, is vulnerable to denial of service attacks caused by a programming mista...

Summary

It was discovered that git-daemon which is part of git-core, a popular
distributed revision control system, is vulnerable to denial of service
attacks caused by a programming mistake in handling requests containing
extra unrecognized arguments which results in an infinite loop. While
this is no problem for the daemon itself as every request will spawn a
new git-daemon instance, this still results in a very high CPU consumption
and might lead to denial of service conditions.


For the oldstable distribution (etch), this problem has been fixed in
version 1.4.4.4-4+etch3.

For the stable distribution (lenny), this problem has been fixed in
version 1.5.6.5-3+lenny2.

For the testing distribution (squeeze), this problem has been fixed in
version 1:1.6.3.3-1.

For the unstable distribution (sid), this problem has been fixed in
version 1:1.6.3.3-1.


We recommend that you upgrade your git-core packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch

Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

Size/MD5 checksum: 72125 920daf694b12a77e06f27324c61753fc
Size/MD5 checksum: 1054130 99bc7ea441226f792b6f796a838e7ef0
Size/MD5 checksum: 805 9fa69bdac10c46441712bcb97a8a9e65

Architecture independent packages:

Size/MD5 checksum: 89018 fa846f8c62895984a153dc720139280b
Size/MD5 checksum: 100788 48ab52e7be61dcb5250ebda54e2d1126
Size/MD5 checksum: 94996 9233cd5e72daae479d299905eca84128
Size/MD5 checksum: 572486 87737fc3ae4191051bd2712190f3fc19
Size/MD5 checksum: 63304 6c558ece1e80966bd662acc67749ac2e
Size/MD5 checksum: 55908 243dc1bc8acc538e45e2631c97771162
Size/MD5 checksum: 100154 892b5d12d207102f27db83d24b6178cb
Size/MD5 checksum: 69016 4b5ddf573ebb0736e967e02a2b355cd3

alpha architecture (DEC Alpha)

Size/MD5 checksum: 3102126 6275cd993e070350bedcf9733e827da0

amd64 architecture (AMD x86_64 (AMD64))

Size/MD5 checksum: 2641296 3dff7bca20524d55e6f9bf2323a8afc1

arm architecture (ARM)

Size/MD5 checksum: 2323022 de2a3964df5fe485a5fb56d009a62dc3

i386 architecture (Intel ia32)

Size/MD5 checksum: 2353750 97fb3bb60dbe68eeb5aae2604949e85c

ia64 architecture (Intel ia64)

Size/MD5 checksum: 3815890 4f6f57eb772f523cc243190cec885dc7

mips architecture (MIPS (Big Endian))

Size/MD5 checksum: 2784346 af422088e354d29ca3c59aba1dba8110

powerpc architecture (PowerPC)

Size/MD5 checksum: 2654894 4cf6082256ec24bddce89d420920c49c

s390 architecture (IBM S/390)

Size/MD5 checksum: 2628316 433af991f74293d69fe64a41130def76

sparc architecture (Sun SPARC/UltraSPARC)

Size/MD5 checksum: 2301672 c79c01e50d773e64a268d2fcebd5385b


Debian GNU/Linux 5.0 alias lenny

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

Size/MD5 checksum: 226798 5f4cc4a02e92213b0dad6c82e856ec2f
Size/MD5 checksum: 2103619 c22da91c913a02305fd8a1a2298f75c9
Size/MD5 checksum: 1331 b56dfde38fdf7f22cc2e27d744a67e90

Architecture independent packages:

Size/MD5 checksum: 404642 e1036baa89a84e7162e4d487021f1881
Size/MD5 checksum: 230828 5caec9b6b0927af9de2df79b840b9d72
Size/MD5 checksum: 301198 744e6545323dfabf86bedf142e2c8605
Size/MD5 checksum: 229240 4d8a53527204bc0224869f55a8812209
Size/MD5 checksum: 268110 e3ad28d153ddaa0bcb56d717139e2e5f
Size/MD5 checksum: 217726 4d256c215df877a8135f6df1069683e3
Size/MD5 checksum: 267514 1d05277557024dc82796a24b42519640
Size/MD5 checksum: 1248188 102d5fa3582d05804a1d16b5d01fb63d
Size/MD5 checksum: 267328 9f7d38c746eb005ecc286002ddb878df

amd64 architecture (AMD x86_64 (AMD64))

Size/MD5 checksum: 3427278 286213e394c88ef73638f667dd9ddc01

arm architecture (ARM)

Size/MD5 checksum: 3045546 e624c48ded4c1c00dacca13e7595b315

i386 architecture (Intel ia32)

Size/MD5 checksum: 3137530 a7a44faa83126a48803e02722b1cc5db

ia64 architecture (Intel ia64)

Size/MD5 checksum: 4759194 8bc9a6f73d11bca6818fd6f16ca20033

mips architecture (MIPS (Big Endian))

Size/MD5 checksum: 3419202 e5ef2e34a07f5b6e1d1ede2184596925

mipsel architecture (MIPS (Little Endian))

Size/MD5 checksum: 3420668 a39d630c3911e5fdf912f8beb8cb36f5

s390 architecture (IBM S/390)

Size/MD5 checksum: 3411278 13619ebe267fa193c8530d0466225f41

sparc architecture (Sun SPARC/UltraSPARC)

Size/MD5 checksum: 3069050 a18eb59eca3198e05a94ee896c71d272


These files will probably be moved into the stable distribution on
its next update.

For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Severity
Package : git-core
Vulnerability : denial of service
Problem type : remote
Debian-specific: no
Debian bug : 532935
CVE ID : CVE-2009-2108

Related News