CVS: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200504-16 / CVS
||April 18, 2005
||April 22, 2005: 03
All supported architectures
Several serious vulnerabilities have been found in CVS, which may allow an
attacker to remotely compromise a CVS server or cause a DoS.
CVS (Concurrent Versions System) is an open-source network-transparent
version control system. It contains both a client utility and a server.
Alen Zukich has discovered several serious security issues in CVS,
including at least one buffer overflow (CAN-2005-0753), memory leaks
and a NULL pointer dereferencing error. Furthermore when launching
trigger scripts CVS includes a user controlled directory.
An attacker could exploit these vulnerabilities to cause a Denial of
Service or execute arbitrary code with the permissions of the CVS
pserver or the authenticated user (depending on the connection method
There is no known workaround at this time.
All CVS users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-util/cvs-1.11.20"