<<< Date Index >>>     <<< Thread Index >>>

TSLSA-2005-0013 - cvs



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2005-0013

Package name:      cvs
Summary:           buffer overflow
Date:              2005-04-20
Affected versions: Trustix Secure Linux 2.2

- --------------------------------------------------------------------------
Package description:
  CVS (Concurrent Version System) is a version control system that can
  record the history of your files (usually, but not always, source
  code). CVS only stores the differences between versions, instead of
  every version of every file you have ever created. CVS also keeps a log
  of who, when, and why changes occurred.


Problem description:
  From the NEWS file:
  - Thanks to a report from Alen Zukich <alen.zukich@xxxxxxxxxxxx>, several
    minor security issues have been addressed.  One was a buffer overflow
    that is potentially serious but which may not be exploitable, assigned
    CAN-2005-0753 by the Common Vulnerabilities and Exposures Project
    <http://www.cve.mitre.org>.  Other fixes resulting from Alen's report
    include repair of an arbitrary free with no known exploit and several
    plugged memory leaks and potentially freed NULL pointers which may have
    been exploitable for a denial of service attack.

  - Thanks to a report from Craig Monson <craig@xxxxxxxxxxxxxxx>, minor
    potential vulnerabilities in the contributed Perl scripts have been
    fixed.  The confirmed vulnerability could allow the execution of
    arbitrary code on the CVS server, but only if a user already had
    commit access and if one of the contrib scripts was installed
    improperly, a condition which should have been quickly visible to
    any administrator.  The complete description of the problem is here:
    <https://ccvs.cvshome.org/issues/show_bug.cgi?id=224>.  If you were
    making use of any of the contributed trigger scripts on a CVS server,
    you should probably still replace them with the new versions, to be
    on the safe side.


Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/>
  or directly at
  <URI:http://www.trustix.org/errata/2005/0013/>


MD5sums of the packages:
- --------------------------------------------------------------------------
05f4dc30cce89fa9b9475516c29b58e4  2.2/rpms/cvs-1.12.12-1tr.i586.rpm
20174ee5a65cec4ae08b59ff6ebf4015  2.2/rpms/cvs-contrib-1.12.12-1tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFCZ3Uxi8CEzsK9IksRAlQXAKCn4LN3sJZKT/SM3wU0idg+spVpgwCeLhv/
oWoeY/2FUREMvPfGCcx0fd8=
=F+Ft
-----END PGP SIGNATURE-----