Secunia Security Advisory - SUSE has issued an update for cvs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
33d75b330e32c71ff6740540a57eb96303bdeb2653fed6f76c115d3a61e4deed
----------------------------------------------------------------------
Want a new IT Security job?
Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
SUSE update for cvs
SECUNIA ADVISORY ID:
SA15003
VERIFY ADVISORY:
http://secunia.com/advisories/15003/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
UnitedLinux 1.0
http://secunia.com/product/2003/
SUSE Linux Enterprise Server 9
http://secunia.com/product/4118/
SuSE Linux Enterprise Server 8
http://secunia.com/product/1171/
SUSE Linux 9.2
http://secunia.com/product/4258/
SuSE Linux 9.1
http://secunia.com/product/3473/
SuSE Linux 9.0
http://secunia.com/product/2467/
SuSE Linux 8.x
http://secunia.com/product/141/
DESCRIPTION:
SUSE has issued an update for cvs. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.
For more information:
SA14976
SOLUTION:
Apply updated packages.
-- x86 Platform --
SUSE Linux 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/cvs-1.12.9-2.2.i586.rpm
7192dce3bb42cd51c98a3510e9e5e73a
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/cvs-1.12.9-2.2.i586.patch.rpm
ae4b8f9096b50e7f1c3a15e715e4c8e7
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/cvs-1.12.9-2.2.src.rpm
cebc4e07ac34f6a6f76789d6ce0eba37
SUSE Linux 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cvs-1.11.14-24.10.i586.rpm
07778aea3050bcf05c96ae680b9d01e4
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cvs-1.11.14-24.10.i586.patch.rpm
60591530555521e34d798a0d0365686a
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/cvs-1.11.14-24.10.src.rpm
bd4b0324b51cee45f247e41f2f6139d4
SUSE Linux 9.0:
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cvs-1.11.6-85.i586.rpm
795f6e5a6849706bb439366129833841
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cvs-1.11.6-85.i586.patch.rpm
ec2bb29f912831f9d5e7dd15ec950d9b
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/cvs-1.11.6-85.src.rpm
a3695ffd8f741a9f376e5e3244d412c8
SUSE Linux 8.2:
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cvs-1.11.5-116.i586.rpm
6fc24ea4712d10855e60d26b9262f48c
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cvs-1.11.5-116.i586.patch.rpm
7b4e1cae79c33c4965b53159bd888a70
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/cvs-1.11.5-116.src.rpm
401896062510804b79ba75a5e800d9e2
-- x86-64 Platform --
SUSE Linux 9.2:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/cvs-1.12.9-2.2.x86_64.rpm
21518326918a0a7e42176b60544e214e
patch rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/cvs-1.12.9-2.2.x86_64.patch.rpm
8bbb9b4bda742cb62836b6a6453aef2c
source rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/src/cvs-1.12.9-2.2.src.rpm
cebc4e07ac34f6a6f76789d6ce0eba37
SUSE Linux 9.1:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cvs-1.11.14-24.10.x86_64.rpm
7543263ca5374da3a9926cde6c8bd58c
patch rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cvs-1.11.14-24.10.x86_64.patch.rpm
1b245e5669be7b6e082c67d5e094466a
source rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/cvs-1.11.14-24.10.src.rpm
8c399e20f6046faa3de70ae0fc133060
SUSE Linux 9.0:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cvs-1.11.6-85.x86_64.rpm
708318fbf0d27efd212c16ac26f63003
patch rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cvs-1.11.6-85.x86_64.patch.rpm
7d5f303351ae584f07998847cc476f7c
source rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/cvs-1.11.6-85.src.rpm
ff6eddc0257dfd8dfa1b97653117d2c7
ORIGINAL ADVISORY:
http://www.novell.com/linux/security/advisories/2005_24_cvs.html
OTHER REFERENCES:
SA14976:
http://secunia.com/advisories/14976/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------