Debian: DSA-3206-1: dulwich security update

    Date28 Mar 2015
    CategoryDebian
    60
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities have been discovered in Dulwich, a Python implementation of the file formats and protocols used by the Git version control system. The Common Vulnerabilities and Exposures project identifies the following problems:
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3206-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                      Salvatore Bonaccorso
    March 28, 2015                         http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : dulwich
    CVE ID         : CVE-2014-9706 CVE-2015-0838
    Debian Bug     : 780958 780989
    
    Multiple vulnerabilities have been discovered in Dulwich, a Python
    implementation of the file formats and protocols used by the Git version
    control system. The Common Vulnerabilities and Exposures project
    identifies the following problems:
    
    CVE-2014-9706
    
        It was discovered that Dulwich allows writing to files under .git/
        when checking out working trees. This could lead to the execution of
        arbitrary code with the privileges of the user running an
        application based on Dulwich.
    
    CVE-2015-0838
    
        Ivan Fratric of the Google Security Team has found a buffer
        overflow in the C implementation of the apply_delta() function,
        used when accessing Git objects in pack files. An attacker could
        take advantage of this flaw to cause the execution of arbitrary
        code with the privileges of the user running a Git server or client
        based on Dulwich.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 0.8.5-2+deb7u2.
    
    For the upcoming stable distribution (jessie), these problems have been
    fixed in version 0.9.7-3.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 0.10.1-1.
    
    We recommend that you upgrade your dulwich packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.26,"resources":[]},{"id":"88","title":"Should be more technical","votes":"16","type":"x","order":"2","pct":13.68,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.06,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.