slackit-ml
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Slackit.org] [slackware-security] cvs (SSA:2004-161-01)


From: Andrea Guarnaccia
Subject: [Slackit.org] [slackware-security] cvs (SSA:2004-161-01)
Date: Sat, 12 Jun 2004 00:01:23 +0200

[slackware-security]  cvs (SSA:2004-161-01)

New cvs packages that have been upgraded to cvs-1.11.17 are available
for Slackware 8.1, 9.0, 9.1, and -current to fix various security
issues.  Sites running a CVS server should upgrade to the new CVS
package right away.

More details about the issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0417
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0418
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0414


Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Wed Jun  9 11:35:15 PDT 2004
patches/packages/cvs-1.11.17-i486-1.tgz:  Upgraded to cvs-1.11.17.
  From the cvs NEWS file:
  * Thanks to Stefan Esser & Sebastian Krahmer, several potential security
    problems have been fixed.  The ones which were considered dangerous enough
    to catalogue were assigned issue numbers CAN-2004-0416, CAN-2004-0417, &
    CAN-2004-0418 by the Common Vulnerabilities and Exposures Project.  Please
    see <http://www.cve.mitre.org> for more information.
  * A potential buffer overflow vulnerability in the server has been fixed.
    This addresses the Common Vulnerabilities and Exposures Project's issue
    CAN-2004-0414.  Please see <http://www.cve.mitre.org> for more information.
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/cvs-1.11.17-i386-1.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/cvs-1.11.17-i386-1.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/cvs-1.11.17-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/cvs-1.11.17-i486-1.tgz


MD5 signatures:
+-------------+

Slackware 8.1 package:
66db824432943ba55f59a967bb873ddd  cvs-1.11.17-i386-1.tgz

Slackware 9.0 package:
ae99eefc6ec2e86d4957839a0bbd09d6  cvs-1.11.17-i386-1.tgz

Slackware 9.1 package:
e87625033650b3cc89172931e5dd2af4  cvs-1.11.17-i486-1.tgz

Slackware -current package:
941eb35ade93da89e622cd19e852c799  cvs-1.11.17-i486-1.tgz


Installation instructions:
+------------------------+

First, shut down the cvs server if you are running one.

Then, upgrade the package:
# upgradepkg cvs-1.11.17-i486-1.tgz

Finally, restart the CVS server.


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
address@hidden


Attachment: signature.asc
Description: Questa parte del messaggio รจ firmata


reply via email to

[Prev in Thread] Current Thread [Next in Thread]