-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Trustix Secure Linux Security Advisory #2005-0013 Package name: cvs Summary: buffer overflow Date: 2005-04-20 Affected versions: Trustix Secure Linux 2.2 - -------------------------------------------------------------------------- Package description: CVS (Concurrent Version System) is a version control system that can record the history of your files (usually, but not always, source code). CVS only stores the differences between versions, instead of every version of every file you have ever created. CVS also keeps a log of who, when, and why changes occurred. Problem description: From the NEWS file: - Thanks to a report from Alen Zukich <alen.zukich@xxxxxxxxxxxx>, several minor security issues have been addressed. One was a buffer overflow that is potentially serious but which may not be exploitable, assigned CAN-2005-0753 by the Common Vulnerabilities and Exposures Project <http://www.cve.mitre.org>. Other fixes resulting from Alen's report include repair of an arbitrary free with no known exploit and several plugged memory leaks and potentially freed NULL pointers which may have been exploitable for a denial of service attack. - Thanks to a report from Craig Monson <craig@xxxxxxxxxxxxxxx>, minor potential vulnerabilities in the contributed Perl scripts have been fixed. The confirmed vulnerability could allow the execution of arbitrary code on the CVS server, but only if a user already had commit access and if one of the contrib scripts was installed improperly, a condition which should have been quickly visible to any administrator. The complete description of the problem is here: <https://ccvs.cvshome.org/issues/show_bug.cgi?id=224>. If you were making use of any of the contributed trigger scripts on a CVS server, you should probably still replace them with the new versions, to be on the safe side. Action: We recommend that all systems with this package installed be upgraded. Please note that if you do not need the functionality provided by this package, you may want to remove it from your system. Location: All Trustix Secure Linux updates are available from <URI:http://http.trustix.org/pub/trustix/updates/> <URI:ftp://ftp.trustix.org/pub/trustix/updates/> About Trustix Secure Linux: Trustix Secure Linux is a small Linux distribution for servers. With focus on security and stability, the system is painlessly kept safe and up to date from day one using swup, the automated software updater. Automatic updates: Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'. Questions? Check out our mailing lists: <URI:http://www.trustix.org/support/> Verification: This advisory along with all Trustix packages are signed with the TSL sign key. This key is available from: <URI:http://www.trustix.org/TSL-SIGN-KEY> The advisory itself is available from the errata pages at <URI:http://www.trustix.org/errata/trustix-2.2/> or directly at <URI:http://www.trustix.org/errata/2005/0013/> MD5sums of the packages: - -------------------------------------------------------------------------- 05f4dc30cce89fa9b9475516c29b58e4 2.2/rpms/cvs-1.12.12-1tr.i586.rpm 20174ee5a65cec4ae08b59ff6ebf4015 2.2/rpms/cvs-contrib-1.12.12-1tr.i586.rpm - -------------------------------------------------------------------------- Trustix Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQFCZ3Uxi8CEzsK9IksRAlQXAKCn4LN3sJZKT/SM3wU0idg+spVpgwCeLhv/ oWoeY/2FUREMvPfGCcx0fd8= =F+Ft -----END PGP SIGNATURE-----