Your message dated Wed, 27 Apr 2005 03:47:03 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#305254: fixed in cvs 1:1.12.9-13 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 18 Apr 2005 21:45:10 +0000 >From [EMAIL PROTECTED] Mon Apr 18 14:45:10 2005 Return-path: <[EMAIL PROTECTED]> Received: from inutil.org (vserver151.vserver151.serverflex.de) [193.22.164.111] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DNe3K-0001Zc-00; Mon, 18 Apr 2005 14:45:10 -0700 Received: from p548955df.dip.t-dialin.net ([84.137.85.223] helo=localhost.localdomain) by vserver151.vserver151.serverflex.de with esmtpsa (TLS-1.0:RSA_AES_256_CBC_SHA:32) (Exim 4.50) id 1DNe3I-0002B1-BA for [EMAIL PROTECTED]; Mon, 18 Apr 2005 23:45:08 +0200 Received: from jmm by localhost.localdomain with local (Exim 4.50) id 1DNe3B-0001gJ-LX; Mon, 18 Apr 2005 23:45:01 +0200 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Moritz Muehlenhoff <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: cvs: Several security issues in CVS X-Mailer: reportbug 3.9 Date: Mon, 18 Apr 2005 23:45:01 +0200 Message-Id: <[EMAIL PROTECTED]> X-SA-Exim-Connect-IP: 84.137.85.223 X-SA-Exim-Mail-From: [EMAIL PROTECTED] X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond expanded to false Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: cvs Version: 1:1.12.9-11 Severity: grave Tags: security Justification: user security hole CVS 1.12.12 fixes several security issues: * Thanks to a report from Alen Zukich <[EMAIL PROTECTED]>, several minor security issues have been addressed. One was a buffer overflow that is potentially serious but which may not be exploitable, assigned CAN-2005-0753 by the Common Vulnerabilities and Exposures Project <[41]http://www.cve.mitre.org>. Other fixes resulting from Alen's report include repair of an arbitrary free with no known exploit and several plugged memory leaks and potentially freed NULL pointers which may have been exploitable for a denial of service attack. * Thanks to a report from Craig Monson <[EMAIL PROTECTED]>, minor potential vulnerabilities in the contributed Perl scripts have been fixed. The confirmed vulnerability could allow the execution of arbitrary code on the CVS server, but only if a user already had commit access and if one of the contrib scripts was installed improperly, a condition which should have been quickly visible to any administrator. The complete description of the problem is here: <https://ccvs.cvshome.org/issues/show_bug.cgi?id=224>. If you were making use of any of the contributed trigger scripts on a CVS server, you should probably still replace them with the new versions, to be on the safe side. Unfortunately, our fix is incomplete. Taint-checking has been enabled in all the contributed Perl scripts intended to be run as trigger scripts, but no attempt has been made to ensure that they still run in taint mode. You will most likely have to tweak the scripts in some way to make them run. Please send any patches you find necessary back to <[EMAIL PROTECTED]> so that we may again ship fully enabled scripts in the future. You should also make sure that any home-grown Perl scripts that you might have installed as CVS triggers also have taint-checking enabled. This can be done by adding `-T' on the scripts' #! lines. Please try running `perldoc perlsec' if you would like more information on general Perl security and taint-checking. Cheers, Moritz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages cvs depends on: ii debconf 1.4.48 Debian configuration management sy ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libpam-runtime 0.76-22 Runtime support for the PAM librar ii libpam0g 0.76-22 Pluggable Authentication Modules l ii zlib1g 1:1.2.2-4 compression library - runtime -- debconf information excluded --------------------------------------- Received: (at 305254-close) by bugs.debian.org; 27 Apr 2005 07:54:21 +0000 >From [EMAIL PROTECTED] Wed Apr 27 00:54:20 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DQhNE-0007mU-00; Wed, 27 Apr 2005 00:54:20 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DQhGB-0002cA-00; Wed, 27 Apr 2005 03:47:03 -0400 From: Steve McIntyre <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#305254: fixed in cvs 1:1.12.9-13 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Wed, 27 Apr 2005 03:47:03 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: cvs Source-Version: 1:1.12.9-13 We believe that the bug you reported is fixed in the latest version of cvs, which is due to be installed in the Debian FTP archive: cvs_1.12.9-13.diff.gz to pool/main/c/cvs/cvs_1.12.9-13.diff.gz cvs_1.12.9-13.dsc to pool/main/c/cvs/cvs_1.12.9-13.dsc cvs_1.12.9-13_alpha.deb to pool/main/c/cvs/cvs_1.12.9-13_alpha.deb cvs_1.12.9-13_i386.deb to pool/main/c/cvs/cvs_1.12.9-13_i386.deb cvs_1.12.9-13_ia64.deb to pool/main/c/cvs/cvs_1.12.9-13_ia64.deb cvs_1.12.9-13_mips.deb to pool/main/c/cvs/cvs_1.12.9-13_mips.deb cvs_1.12.9-13_powerpc.deb to pool/main/c/cvs/cvs_1.12.9-13_powerpc.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steve McIntyre <[EMAIL PROTECTED]> (supplier of updated cvs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 27 Apr 2005 00:55:57 +0100 Source: cvs Binary: cvs Architecture: alpha i386 ia64 mips powerpc source Version: 1:1.12.9-13 Distribution: unstable Urgency: high Maintainer: Steve McIntyre <[EMAIL PROTECTED]> Changed-By: Steve McIntyre <[EMAIL PROTECTED]> Description: cvs - Concurrent Versions System Closes: 305254 Changes: cvs (1:1.12.9-13) unstable; urgency=high . * Security fixes, hence high urgency. * Fixes for CAN-2005-0753: + Buffer overflow + Arbitrary free() call + Potential NULL dereference * Fixes for contrib perl scripts * Closes: #305254 Files: 30856918fdcbe6d673b3bdfdcb282b02 1444386 devel optional cvs_1.12.9-13_i386.deb 3cf1cfcb5eadd98fe273eeebe95fb90d 1602686 devel optional cvs_1.12.9-13_ia64.deb 8df840f5f09dc0670a51f74ce7fe3077 695 devel optional cvs_1.12.9-13.dsc bfad77ad2af9bccedc0ec09f8f719933 1463028 devel optional cvs_1.12.9-13_powerpc.deb de78534409951b641c81e59c16315225 1471640 devel optional cvs_1.12.9-13_mips.deb f45d1b0525e46a69f43a5dd2b023cfdf 66710 devel optional cvs_1.12.9-13.diff.gz fba155872863955060a2ab629927da5e 1526552 devel optional cvs_1.12.9-13_alpha.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCbz7LfDt5cIjHwfcRAjagAKCLNiyY1fiw/oJhp6+yGzp66/DvwQCeNk47 JdPgKjQJEpwqVI5dOZdk8so= =4XVL -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]