blob: 8ab55fbcc5ed6b13432355beaa01f5e24662014b [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200405-25">
<title>tla: Multiple vulnerabilities in included libneon</title>
tla includes a vulnerable version of the neon library.
<product type="ebuild">tla</product>
<announced>May 30, 2004</announced>
<revised>June 02, 2004: 02</revised>
<package name="dev-util/tla" auto="yes" arch="*">
<unaffected range="ge">1.2-r2</unaffected>
<vulnerable range="le">1.2-r1</vulnerable>
<vulnerable range="eq">1.2.1_pre1</vulnerable>
GNU Arch (tla) is a revision control system suited for widely distributed
Multiple format string vulnerabilities and a heap overflow vulnerability
were discovered in the code of the neon library (GLSA 200405-01 and
200405-13). Current versions of the tla package include their own version
of this library.
<impact type="normal">
When connected to a malicious WebDAV server, these vulnerabilities could
allow execution of arbitrary code with the rights of the user running tla.
There is no known workaround at this time.
All users of tla should upgrade to the latest stable version:
# emerge sync
# emerge -pv ">=dev-util/tla-1.2-r2"
# emerge ">=dev-util/tla-1.2-r2"</code>
<uri link="/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
<uri link="/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
<metadata tag="submitter">