Lucene search

K
gentooGentoo FoundationGLSA-200504-16
HistoryApr 18, 2005 - 12:00 a.m.

CVS: Multiple vulnerabilities

2005-04-1800:00:00
Gentoo Foundation
security.gentoo.org
10

0.848 High

EPSS

Percentile

98.5%

Background

CVS (Concurrent Versions System) is an open-source network-transparent version control system. It contains both a client utility and a server.

Description

Alen Zukich has discovered several serious security issues in CVS, including at least one buffer overflow (CAN-2005-0753), memory leaks and a NULL pointer dereferencing error. Furthermore when launching trigger scripts CVS includes a user controlled directory.

Impact

An attacker could exploit these vulnerabilities to cause a Denial of Service or execute arbitrary code with the permissions of the CVS pserver or the authenticated user (depending on the connection method used).

Workaround

There is no known workaround at this time.

Resolution

All CVS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-util/cvs-1.11.20"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-util/cvs< 1.11.20UNKNOWN