CVE-2014-9390: Errors in handling case-sensitive directories allow for remote code execution on pull

Related Vulnerabilities: CVE-2014-9390  

Debian Bug report logs - #773640
CVE-2014-9390: Errors in handling case-sensitive directories allow for remote code execution on pull

version graph

Reported by: Javi Merino <vicho@debian.org>

Date: Sun, 21 Dec 2014 11:39:01 UTC

Severity: important

Tags: security, upstream

Found in version mercurial/3.1.2-1

Fixed in version mercurial/3.1.2-2

Done: Javi Merino <vicho@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, vicho@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Python Applications Packaging Team <python-apps-team@lists.alioth.debian.org>:
Bug#773640; Package mercurial. (Sun, 21 Dec 2014 11:39:06 GMT) (full text, mbox, link).


Acknowledgement sent to Javi Merino <vicho@debian.org>:
New Bug report received and forwarded. Copy sent to vicho@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Python Applications Packaging Team <python-apps-team@lists.alioth.debian.org>. (Sun, 21 Dec 2014 11:39:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Javi Merino <vicho@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2014-9390: Errors in handling case-sensitive directories allow for remote code execution on pull
Date: Sun, 21 Dec 2014 12:38:02 +0100
Package: mercurial
Version: 3.1.2-1
Severity: important
Tags: security upstream

CVE-2014-9390[0][1] is a security vulnerability that affects mercurial
repositories in a case-sensitive filesystem (eg. VFAT or HFS+).  It
allows for remote code execution of a specially crafted repository.
This is less severe for the average Debian installation as they are
usually set up with case-insensitive filesystems.

[0] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390
[1] https://security-tracker.debian.org/tracker/CVE-2014-9390

This affects both Wheezy and Jessie.

-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages mercurial depends on:
ii  libc6             2.19-13
ii  mercurial-common  3.1.2-1
ii  python            2.7.8-2
ii  ucf               3.0030

Versions of packages mercurial recommends:
ii  openssh-client  1:6.7p1-3

Versions of packages mercurial suggests:
pn  kdiff3 | kdiff3-qt | kompare | meld | tkcvs | mgdiff  <none>
pn  qct                                                   <none>

-- no debconf information



Information forwarded to debian-bugs-dist@lists.debian.org, Python Applications Packaging Team <python-apps-team@lists.alioth.debian.org>:
Bug#773640; Package mercurial. (Sun, 21 Dec 2014 12:12:04 GMT) (full text, mbox, link).


Acknowledgement sent to Javi Merino <vicho@debian.org>:
Extra info received and forwarded to list. Copy sent to Python Applications Packaging Team <python-apps-team@lists.alioth.debian.org>. (Sun, 21 Dec 2014 12:12:04 GMT) (full text, mbox, link).


Message #10 received at 773640@bugs.debian.org (full text, mbox, reply):

From: Javi Merino <vicho@debian.org>
To: 773640@bugs.debian.org
Subject: Re: Bug#773640: CVE-2014-9390: Errors in handling case-sensitive directories allow for remote code execution on pull
Date: Sun, 21 Dec 2014 13:09:57 +0100
On Sun, Dec 21, 2014 at 12:38:02PM +0100, Javi Merino wrote:
> Package: mercurial
> Version: 3.1.2-1
> Severity: important
> Tags: security upstream
> 
> CVE-2014-9390[0][1] is a security vulnerability that affects mercurial
> repositories in a case-sensitive filesystem (eg. VFAT or HFS+).  It
> allows for remote code execution of a specially crafted repository.
> This is less severe for the average Debian installation as they are
> usually set up with case-insensitive filesystems.
> 
> [0] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390
> [1] https://security-tracker.debian.org/tracker/CVE-2014-9390
> 
> This affects both Wheezy and Jessie.

In Ubuntu[0] they've fixed it by applying the following patches:

- http://selenic.com/repo/hg-stable/rev/035434b407be
- http://selenic.com/repo/hg-stable/rev/885bd7c5c7e3
- http://selenic.com/repo/hg-stable/rev/c02a05cc6f5e
- http://selenic.com/repo/hg-stable/rev/7a5bcd471f2e
- http://selenic.com/repo/hg-stable/rev/6dad422ecc5a

[0] https://bugs.launchpad.net/ubuntu/+source/git/+bug/1404035
[1] https://launchpadlibrarian.net/193058010/mercurial_3.1.2-1ubuntu1_source.changes

I'm working on applying the same patches.



Added tag(s) pending. Request was from vicho@users.alioth.debian.org to control@bugs.debian.org. (Sun, 21 Dec 2014 20:27:14 GMT) (full text, mbox, link).


Reply sent to Javi Merino <vicho@debian.org>:
You have taken responsibility. (Tue, 23 Dec 2014 23:39:05 GMT) (full text, mbox, link).


Notification sent to Javi Merino <vicho@debian.org>:
Bug acknowledged by developer. (Tue, 23 Dec 2014 23:39:05 GMT) (full text, mbox, link).


Message #17 received at 773640-close@bugs.debian.org (full text, mbox, reply):

From: Javi Merino <vicho@debian.org>
To: 773640-close@bugs.debian.org
Subject: Bug#773640: fixed in mercurial 3.1.2-2
Date: Tue, 23 Dec 2014 23:36:13 +0000
Source: mercurial
Source-Version: 3.1.2-2

We believe that the bug you reported is fixed in the latest version of
mercurial, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 773640@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Javi Merino <vicho@debian.org> (supplier of updated mercurial package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 23 Dec 2014 16:01:50 +0100
Source: mercurial
Binary: mercurial-common mercurial
Architecture: source all amd64
Version: 3.1.2-2
Distribution: unstable
Urgency: high
Maintainer: Python Applications Packaging Team <python-apps-team@lists.alioth.debian.org>
Changed-By: Javi Merino <vicho@debian.org>
Description:
 mercurial  - easy-to-use, scalable distributed version control system
 mercurial-common - easy-to-use, scalable distributed version control system (common
Closes: 773640
Changes:
 mercurial (3.1.2-2) unstable; urgency=high
 .
   * Fix "CVE-2014-9390: Errors in handling case-sensitive directories
     allow for remote code execution on pull" by adding patches
     from_upstream__encoding_add_hfsignoreclean_to_clean_out_HFS-ignored_characters.patch,
     from_upstream__pathauditor_check_for_codepoints_ignored_on_OS_X.patch,
     and
     from_upstream__pathauditor_check_for_Windows_shortname_aliases.patch
     (Closes: #773640)
Checksums-Sha1:
 fdb10bc443c9b4df6e548c9d1f8897b31e921225 2245 mercurial_3.1.2-2.dsc
 87136a9c966ac71be476fca9f79d357d3b12f975 46644 mercurial_3.1.2-2.debian.tar.xz
 25d5525fa86adce65d3e4ecdcd1ce955377d4029 1598232 mercurial-common_3.1.2-2_all.deb
 d9a8e8a86ca4d9db5933753ebe07a800e6cf7f99 59900 mercurial_3.1.2-2_amd64.deb
Checksums-Sha256:
 6c951dddaee50880db324618700a5062c5d0791b57b443657c221d8f5a9d2ab9 2245 mercurial_3.1.2-2.dsc
 5bcf0f922e1f52ab95a6b10e943879fb0652b27ab1f5c108b20fddc23873dfb1 46644 mercurial_3.1.2-2.debian.tar.xz
 c03c83e02517bf6b7d9fd5d18f1e7fc39bac797abfffd026fe6d353704dc5300 1598232 mercurial-common_3.1.2-2_all.deb
 20d12ef4ba8591ecdab7c25511caddbd853de0453af776ee2e4bbbe3ef718ac1 59900 mercurial_3.1.2-2_amd64.deb
Files:
 24f6350a1977b3bca112fb41eeb6a7b8 2245 vcs optional mercurial_3.1.2-2.dsc
 f606643dadd74cb4067bd26c6dfd4722 46644 vcs optional mercurial_3.1.2-2.debian.tar.xz
 835a5e6e347e600554ffd8b8408a90f9 1598232 vcs optional mercurial-common_3.1.2-2_all.deb
 2737fe53315849bc9aac5bd2f8e6801b 59900 vcs optional mercurial_3.1.2-2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=x+nd
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 24 Jan 2015 07:27:29 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:20:30 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.