Linux Today: Linux News On Internet Time.

More on LinuxToday

Slackware Linux Advisory: cvs

Jun 10, 2004, 03:59 (0 Talkback[s])

[slackware-security] cvs (SSA:2004-161-01)

New cvs packages that have been upgraded to cvs-1.11.17 are available for Slackware 8.1, 9.0, 9.1, and -current to fix various security issues. Sites running a CVS server should upgrade to the new CVS package right away.

More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database:


Here are the details from the Slackware 9.1 ChangeLog:
Wed Jun 9 11:35:15 PDT 2004
patches/packages/cvs-1.11.17-i486-1.tgz: Upgraded to cvs-1.11.17. From the cvs NEWS file:

  • Thanks to Stefan Esser & Sebastian Krahmer, several potential security problems have been fixed. The ones which were considered dangerous enough to catalogue were assigned issue numbers CAN-2004-0416, CAN-2004-0417, & CAN-2004-0418 by the Common Vulnerabilities and Exposures Project. Please see <http://www.cve.mitre.org>; for more information.
  • A potential buffer overflow vulnerability in the server has been fixed. This addresses the Common Vulnerabilities and Exposures Project's issue CAN-2004-0414. Please see <http://www.cve.mitre.org>; for more information.
    (* Security fix *)

Where to find the new packages:

Updated package for Slackware 8.1:

Updated package for Slackware 9.0:

Updated package for Slackware 9.1:

Updated package for Slackware -current:

MD5 signatures:

Slackware 8.1 package:
66db824432943ba55f59a967bb873ddd cvs-1.11.17-i386-1.tgz

Slackware 9.0 package:
ae99eefc6ec2e86d4957839a0bbd09d6 cvs-1.11.17-i386-1.tgz

Slackware 9.1 package:
e87625033650b3cc89172931e5dd2af4 cvs-1.11.17-i486-1.tgz

Slackware -current package:
941eb35ade93da89e622cd19e852c799 cvs-1.11.17-i486-1.tgz

Installation instructions:

First, shut down the cvs server if you are running one.

Then, upgrade the package:
# upgradepkg cvs-1.11.17-i486-1.tgz

Finally, restart the CVS server.


Slackware Linux Security Team