blob: 14ce82f7d6217e44a4f42975a69d97ce7255d1bb [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200504-16">
<title>CVS: Multiple vulnerabilities</title>
Several serious vulnerabilities have been found in CVS, which may allow an
attacker to remotely compromise a CVS server or cause a DoS.
<product type="ebuild">CVS</product>
<announced>April 18, 2005</announced>
<revised>April 22, 2005: 03</revised>
<package name="dev-util/cvs" auto="yes" arch="*">
<unaffected range="ge">1.11.20</unaffected>
<vulnerable range="lt">1.11.20</vulnerable>
CVS (Concurrent Versions System) is an open-source network-transparent
version control system. It contains both a client utility and a server.
Alen Zukich has discovered several serious security issues in CVS,
including at least one buffer overflow (CAN-2005-0753), memory leaks
and a NULL pointer dereferencing error. Furthermore when launching
trigger scripts CVS includes a user controlled directory.
<impact type="high">
An attacker could exploit these vulnerabilities to cause a Denial of
Service or execute arbitrary code with the permissions of the CVS
pserver or the authenticated user (depending on the connection method
There is no known workaround at this time.
All CVS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cvs-1.11.20&quot;</code>
<uri link="">CAN-2005-0753</uri>
<metadata tag="submitter" timestamp="Tue, 12 Apr 2005 18:45:36 +0000">
<metadata tag="bugReady" timestamp="Mon, 18 Apr 2005 20:37:28 +0000">