[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3206-1 dulwich -- dulwich

ID: oval:org.secpod.oval:def:602016Date: (C)2015-03-30   (M)2021-09-11
Class: PATCHFamily: unix




Multiple vulnerabilities have been discovered in Dulwich, a Python implementation of the file formats and protocols used by the Git version control system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2014-9706 It was discovered that Dulwich allows writing to files under .git/ when checking out working trees. This could lead to the execution of arbitrary code with the privileges of the user running an application based on Dulwich. CVE-2015-0838 Ivan Fratric of the Google Security Team has found a buffer overflow in the C implementation of the apply_delta function, used when accessing Git objects in pack files. An attacker could take advantage of this flaw to cause the execution of arbitrary code with the privileges of the user running a Git server or client based on Dulwich.

Platform:
Debian 7.0
Product:
python-dulwich
Reference:
DSA-3206-1
CVE-2014-9706
CVE-2015-0838
CVE    2
CVE-2014-9706
CVE-2015-0838
CPE    2
cpe:/a:jelmer:python-dulwich
cpe:/o:debian:debian_linux:7.x

© SecPod Technologies