SuSE: 2004-013: cvs Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: cvs
Announcement-ID: SuSE-SA:2004:013
Date: Wed May 19 13:00:00 MEST 2004
Affected products: 8.0, 8.1, 8.2, 9.0, 9.1
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Enterprise Server 7, 8
SuSE Linux Office Server
UnitedLinux 1.0
Vulnerability Type: remote command execution
Severity (1-10): 6
SUSE default package: No.
Cross References: CAN-2004-0396
Content of this advisory:
1) security vulnerability resolved: buffer overflow in cvs
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- neon
- subversion
- kdelibs/kdelibs3
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The Concurrent Versions System (CVS) offers tools which allow developers to share and maintain large software projects.
Stefan Esser reported buffer overflow conditions within the cvs program.
They allow remote attackers to execute arbitrary code as the user
the cvs server runs as. Since there is no easy workaround we strongly
recommend to update the cvs package.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
Intel i386 Platform:
SuSE-9.1:
69c95cbfa186423e5ccd0bceca85ce5e
patch rpm(s):
ed22f3796ba36d11e8b57206cc44ba50
source rpm(s):
decc60230083b364be07846947baa10f
SuSE-9.0:
161e5eece784ccec09e54d93a48a25eb
patch rpm(s):
3832183c3375821d96d6bbe841c2542a
source rpm(s):
2e92aa8a31f034ab24b95d5586a878b3
SuSE-8.2:
c03d619fa87ffdd87e9d194ce21ce26a
patch rpm(s):
239d2dcb90a84b9a189f7320443b7710
source rpm(s):
8f813f570a0c24f204141006aa113e9b
SuSE-8.1:
f0ded9029096e4c7fe448bfd766873c8
patch rpm(s):
f283e18a349d0b591fcc99e856e2d2a0
source rpm(s):
2fea2689f867ef164db489fc3e7ae7ae
SuSE-8.0:
c92b15968da527c390bc2fdb43678aed
patch rpm(s):
bd265ef4d22e697083fb7c4651282a29
source rpm(s):
a4fd9ee43942c279f1daff2f62472cee
Opteron x86_64 Platform:
SuSE-9.1:
94d36ec490837efc5b31ec425f7fd52e
patch rpm(s):
94909d2d14bac22141ae5422d0905e93
source rpm(s):
0ccd11bc9288c9caf2b695fabb4f2c8e
SuSE-9.0:
19bad506fcf71a5391c7e597aca841a9
patch rpm(s):
12bac5dd73b90cacb4da3ce7cabef60e
source rpm(s):
35f08b9134b849dbdeb43864c48e7406
______________________________________________________________________________
2) Pending vulnerabilities in SUSE Distributions and Workarounds:
- neon
The neon library contains a buffer overflow which allows attackers to execute arbitrary code as the user utilizing the neon library.
New neon packages are available on our ftp servers. CAN-2004-0398
has been assigned to this issue.
- subversion
New subversion, subversion-devel and subversion-server packages are
available on our ftp servers, fixing a stack overflow issue while
handling REPORT queries. CAN-2004-0397 has been assigned to this issue.
- kdelibs/kdelib3
New kdelibs and kdelibs3 packages are currently being tested, fixing
the vulnerabilities described in
https://kde.org/info/security/advisory-20040517-1.txt.
New packages will soon be available on our ftp servers.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References