it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 3206-1] dulwich security update
- Date: Sat, 28 Mar 2015 13:22:01 +0000
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- Old-return-path: <carnil AT master.debian.org>
- Priority: urgent
- Resent-date: Sat, 28 Mar 2015 13:22:17 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <qHaTXZvYICG.A.stG.JsqFVB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3206-1 security AT debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
March 28, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : dulwich
CVE ID : CVE-2014-9706 CVE-2015-0838
Debian Bug : 780958 780989
Multiple vulnerabilities have been discovered in Dulwich, a Python
implementation of the file formats and protocols used by the Git version
control system. The Common Vulnerabilities and Exposures project
identifies the following problems:
CVE-2014-9706
It was discovered that Dulwich allows writing to files under .git/
when checking out working trees. This could lead to the execution of
arbitrary code with the privileges of the user running an
application based on Dulwich.
CVE-2015-0838
Ivan Fratric of the Google Security Team has found a buffer
overflow in the C implementation of the apply_delta() function,
used when accessing Git objects in pack files. An attacker could
take advantage of this flaw to cause the execution of arbitrary
code with the privileges of the user running a Git server or client
based on Dulwich.
For the stable distribution (wheezy), these problems have been fixed in
version 0.8.5-2+deb7u2.
For the upcoming stable distribution (jessie), these problems have been
fixed in version 0.9.7-3.
For the unstable distribution (sid), these problems have been fixed in
version 0.10.1-1.
We recommend that you upgrade your dulwich packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=OotG
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: E1Ybqgb-0006M9-5D AT master.debian.org">https://lists.debian.org/E1Ybqgb-0006M9-5D AT master.debian.org
- [IT-SecNots] [SECURITY] [DSA 3206-1] dulwich security update, Salvatore Bonaccorso, 28.03.2015
Archiv bereitgestellt durch MHonArc 2.6.19.