DSA-3206-1 dulwich -- security update

Related Vulnerabilities: CVE-2014-9706   CVE-2015-0838  

Multiple vulnerabilities have been discovered in Dulwich, a Python implementation of the file formats and protocols used by the Git version control system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2014-9706 It was discovered that Dulwich allows writing to files under .git/ when checking out working trees. This could lead to the execution of arbitrary code with the privileges of the user running an application based on Dulwich. CVE-2015-0838 Ivan Fratric of the Google Security Team has found a buffer overflow in the C implementation of the apply_delta() function, used when accessing Git objects in pack files. An attacker could take advantage of this flaw to cause the execution of arbitrary code with the privileges of the user running a Git server or client based on Dulwich. For the stable distribution (wheezy), these problems have been fixed in version 0.8.5-2+deb7u2. For the upcoming stable distribution (jessie), these problems have been fixed in version 0.9.7-3. For the unstable distribution (sid), these problems have been fixed in version 0.10.1-1. We recommend that you upgrade your dulwich packages.

Debian Security Advisory

DSA-3206-1 dulwich -- security update

Date Reported:
28 Mar 2015
Affected Packages:
dulwich
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 780958, Bug 780989.
In Mitre's CVE dictionary: CVE-2014-9706, CVE-2015-0838.
More information:

Multiple vulnerabilities have been discovered in Dulwich, a Python implementation of the file formats and protocols used by the Git version control system. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2014-9706

    It was discovered that Dulwich allows writing to files under .git/ when checking out working trees. This could lead to the execution of arbitrary code with the privileges of the user running an application based on Dulwich.

  • CVE-2015-0838

    Ivan Fratric of the Google Security Team has found a buffer overflow in the C implementation of the apply_delta() function, used when accessing Git objects in pack files. An attacker could take advantage of this flaw to cause the execution of arbitrary code with the privileges of the user running a Git server or client based on Dulwich.

For the stable distribution (wheezy), these problems have been fixed in version 0.8.5-2+deb7u2.

For the upcoming stable distribution (jessie), these problems have been fixed in version 0.9.7-3.

For the unstable distribution (sid), these problems have been fixed in version 0.10.1-1.

We recommend that you upgrade your dulwich packages.