The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[PLSN-0005] new cvs package available


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Mon, 25 Apr 2005 22:12:54 -0400
From: Peachtree Linux Security Team <security@peachtree.burdell.org.>
To: [email protected],
Subject: [PLSN-0005] new cvs package available
Message-ID: <20050426021254.GA8840@kevlar.burdell.org.>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="M9NhX3UHpAaciwkO"
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
X-Virus-Scanned: antivirus-gw at tyumen.ru


--M9NhX3UHpAaciwkO
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

---------------------------------------------------------------------------
Peachtree Linux Security Notice PLSN-0005
April 22, 2005

Buffer overflow, memory leaks, and NULL pointer dereference in CVS
CAN-2005-0753, http://www.cvshome.org/
---------------------------------------------------------------------------

The following Peachtree Linux releases are affected:

   Peachtree Linux release 1 ("Atlanta")

Description:

   From the CVS changelog:

   Thanks to a report from Alen Zukich <alen.zukich@klocwork.com.>, several
   minor security issues have been addressed.  One was a buffer overflow
   that is potentially serious but which may not be exploitable, assigned
   CAN-2005-0753 by the Common Vulnerabilities and Exposures Project
   <http://www.cve.mitre.org>;.  Other fixes resulting from Alen's report
   include repair of an arbitrary free with no known exploit and several
   plugged memory leaks and potentially freed NULL pointers which may have
   been exploitable for a denial of service attack.

   Thanks to a report from Craig Monson <craig@malachiarts.com.>, minor
   potential vulnerabilities in the contributed Perl scripts have been
   fixed.  The confirmed vulnerability could allow the execution of
   arbitrary code on the CVS server, but only if a user already had commit
   access and if one of the contrib scripts was installed improperly, a
   condition which should have been quickly visible to any administrator.
   The complete description of the problem is here:
   <https://ccvs.cvshome.org/issues/show_bug.cgi?id=3D224>.  If you were
   making use of any of the contributed trigger scripts on a CVS server,
   you should probably still replace them with the new versions, to be on
   the safe side.

   Unfortunately, our fix is incomplete.  Taint-checking has been enabled
   in all the contributed Perl scripts intended to be run as trigger
   scripts, but no attempt has been made to ensure that they still run in
   taint mode.  You will most likely have to tweak the scripts in some way
   to make them run.  Please send any patches you find necessary back to
   <bug-cvs@gnu.org.> so that we may again ship fully enabled scripts in
   the future.

   You should also make sure that any home-grown Perl scripts that you
   might have installed as CVS triggers also have taint-checking enabled.
   This can be done by adding `-T' on the scripts' #! lines.  Please try
   running `perldoc perlsec' if you would like more information on
   general Perl security and taint-checking.

Packages:

   alpha
      177d487f2b06c39b844fa934609bed73  cvs-1.11.20.alpha.dist

   i386
      007de7131e2eb367b0f88b7f336052ed  cvs-1.11.20.i686.dist

   ppc
      81ebb3159903205c189f808368d20dc5  cvs-1.11.20.ppc.dist

Solution:

   Download the appropriate package for your release of Peachtree linux.
   Upgrade your system to the new package:

      distadd -u packagename

   Where package name is the name of the package file from the list above.

   After upgrading the cvs package, you'll want to kill and restart any
   server processes you have running.

--=20
Peachtree Linux Security Team
http://peachtree.burdell.org/

--M9NhX3UHpAaciwkO
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCbaOmnchtWYh7oqQRAqaOAKCGKKFogqrpnNuBFKlicxnFzWO8wQCgl10u
g9EhuGi6a2K8tLnu/zZbMgI=
=3b3t
-----END PGP SIGNATURE-----

--M9NhX3UHpAaciwkO--


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру