Date: Thu, 21 Apr 2005 14:24:47 +0200
From: Trustix Security Advisor <tsl@trustix.org.>
To: [email protected]Subject: TSLSA-2005-0013 - cvs
Message-ID: <20050421122447.GA1386@tsunami.trustix.net.>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
X-Virus-Scanned: amavisd-new at lists.trustix.org
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2005-0013
Package name: cvs
Summary: buffer overflow
Date: 2005-04-20
Affected versions: Trustix Secure Linux 2.2
- --------------------------------------------------------------------------
Package description:
CVS (Concurrent Version System) is a version control system that can
record the history of your files (usually, but not always, source
code). CVS only stores the differences between versions, instead of
every version of every file you have ever created. CVS also keeps a log
of who, when, and why changes occurred.
Problem description:
From the NEWS file:
- Thanks to a report from Alen Zukich <alen.zukich@klocwork.com.>, several
minor security issues have been addressed. One was a buffer overflow
that is potentially serious but which may not be exploitable, assigned
CAN-2005-0753 by the Common Vulnerabilities and Exposures Project
<http://www.cve.mitre.org>. Other fixes resulting from Alen's report
include repair of an arbitrary free with no known exploit and several
plugged memory leaks and potentially freed NULL pointers which may have
been exploitable for a denial of service attack.
- Thanks to a report from Craig Monson <craig@malachiarts.com.>, minor
potential vulnerabilities in the contributed Perl scripts have been
fixed. The confirmed vulnerability could allow the execution of
arbitrary code on the CVS server, but only if a user already had
commit access and if one of the contrib scripts was installed
improperly, a condition which should have been quickly visible to
any administrator. The complete description of the problem is here:
<https://ccvs.cvshome.org/issues/show_bug.cgi?id=224>. If you were
making use of any of the contributed trigger scripts on a CVS server,
you should probably still replace them with the new versions, to be
on the safe side.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.2/>
or directly at
<URI:http://www.trustix.org/errata/2005/0013/>
MD5sums of the packages:
- --------------------------------------------------------------------------
05f4dc30cce89fa9b9475516c29b58e4 2.2/rpms/cvs-1.12.12-1tr.i586.rpm
20174ee5a65cec4ae08b59ff6ebf4015 2.2/rpms/cvs-contrib-1.12.12-1tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQFCZ3Uxi8CEzsK9IksRAlQXAKCn4LN3sJZKT/SM3wU0idg+spVpgwCeLhv/
oWoeY/2FUREMvPfGCcx0fd8=
=F+Ft
-----END PGP SIGNATURE-----