|
|
Subscribe / Log in / New account

Slackware alert SSA:2004-161-01 (cvs)

From:  Slackware Security Team <security@slackware.com>
To:  slackware-security@slackware.com
Subject:  [slackware-security] cvs (SSA:2004-161-01)
Date:  Wed, 9 Jun 2004 14:05:46 -0700 (PDT)

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] cvs (SSA:2004-161-01) New cvs packages that have been upgraded to cvs-1.11.17 are available for Slackware 8.1, 9.0, 9.1, and -current to fix various security issues. Sites running a CVS server should upgrade to the new CVS package right away. More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0417 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0418 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0414 Here are the details from the Slackware 9.1 ChangeLog: +--------------------------+ Wed Jun 9 11:35:15 PDT 2004 patches/packages/cvs-1.11.17-i486-1.tgz: Upgraded to cvs-1.11.17. From the cvs NEWS file: * Thanks to Stefan Esser & Sebastian Krahmer, several potential security problems have been fixed. The ones which were considered dangerous enough to catalogue were assigned issue numbers CAN-2004-0416, CAN-2004-0417, & CAN-2004-0418 by the Common Vulnerabilities and Exposures Project. Please see <http://www.cve.mitre.org> for more information. * A potential buffer overflow vulnerability in the server has been fixed. This addresses the Common Vulnerabilities and Exposures Project's issue CAN-2004-0414. Please see <http://www.cve.mitre.org> for more information. (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Updated package for Slackware 8.1: ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/cvs-1.11.17-i386-1.tgz Updated package for Slackware 9.0: ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/cvs-1.11.17-i386-1.tgz Updated package for Slackware 9.1: ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/cvs-1.11.17-i486-1.tgz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/cvs-1.11.17-i486-1.tgz MD5 signatures: +-------------+ Slackware 8.1 package: 66db824432943ba55f59a967bb873ddd cvs-1.11.17-i386-1.tgz Slackware 9.0 package: ae99eefc6ec2e86d4957839a0bbd09d6 cvs-1.11.17-i386-1.tgz Slackware 9.1 package: e87625033650b3cc89172931e5dd2af4 cvs-1.11.17-i486-1.tgz Slackware -current package: 941eb35ade93da89e622cd19e852c799 cvs-1.11.17-i486-1.tgz Installation instructions: +------------------------+ First, shut down the cvs server if you are running one. Then, upgrade the package: # upgradepkg cvs-1.11.17-i486-1.tgz Finally, restart the CVS server. +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAx3G2akRjwEAQIjMRAhuiAJsFtPDk4dVPZ8Q4wdRFT9PTpM60mACfU90K KAjs3oVu+r6nNPMze/0M66s= =iFLT -----END PGP SIGNATURE-----


(Log in to post comments)


Copyright © 2024, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds