Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2012:0253 - Bug Fix Advisory
Issued:
2012-02-20
Updated:
2012-02-20

RHBA-2012:0253 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

cvs bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated cvs packages that fix two bugs are now available for Red Hat Enterprise
Linux 5.

Description

The Concurrent Versions System (CVS) is a version control system that can record
the history of your files. CVS only stores the differences between versions,
instead of every version of every file you have ever created. CVS also keeps a
log of who, when, and why changes occurred.

This update fixes the following bugs:

  • Previously, the CVS server did not pass the client address to the Pluggable

Authentication Modules (PAM) system. As a result, it was not possible to
distinguish clients by the network address with the PAM system and the system
was not able to utilize the client address and use it for the authentication or
authorization purposes. With this update, the client network address is passed
to the PAM subsystem as a remote host item (PAM_RHOST). Also, the terminal item
(PAM_TTY) is set to a dummy value "cvs" because some PAM modules cannot work
with an unset value. (BZ#538376)

  • Previously, when using the "cvs rtag" command with a repository, which

included the "." character in the repository path, the CVS server hit the
assertion test and terminated. With this update, the assertion check for "." in
the CVSROOT path has been removed as CVS can process this path safely now so
that "cvs rtag" works with repositories with "." in the CVSROOT path as
expected. (BZ#769298)

All CVS users are advised to upgrade to these updated packages, which fix these
bugs.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 538376 - CVS PAM authentication does not support RHOST item
  • BZ - 769298 - cvs assertion failure

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
cvs-1.11.22-11.el5.src.rpm SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2
x86_64
cvs-1.11.22-11.el5.x86_64.rpm SHA-256: f8dcf175d2dfd42e79c8242ec2d6ea5af358488ee7cf56af42f32b46f3f03e57
cvs-inetd-1.11.22-11.el5.x86_64.rpm SHA-256: 4b57a9336d1bf221b7ea729fc066955e6a1d2444ba491b5e3c3149274665dac5
ia64
cvs-1.11.22-11.el5.ia64.rpm SHA-256: 523f10b99050a46bb4be1878d4f08d8d477652240b59218233e184018f7a5892
cvs-inetd-1.11.22-11.el5.ia64.rpm SHA-256: f619607945c341d25023b9feb976c50692ba98853212eeb59a68586da0622b6f
i386
cvs-1.11.22-11.el5.i386.rpm SHA-256: 791986af6c14ecd881b4f1b38bb7b4e6fabaa3d803ea6bc288028bf6feac7a88
cvs-inetd-1.11.22-11.el5.i386.rpm SHA-256: 4c11a4272d7f5c0d5fc59dd1d7a25f68ba3383f679fec48235606b22d0bbe52e

Red Hat Enterprise Linux Workstation 5

SRPM
cvs-1.11.22-11.el5.src.rpm SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2
x86_64
cvs-1.11.22-11.el5.x86_64.rpm SHA-256: f8dcf175d2dfd42e79c8242ec2d6ea5af358488ee7cf56af42f32b46f3f03e57
cvs-inetd-1.11.22-11.el5.x86_64.rpm SHA-256: 4b57a9336d1bf221b7ea729fc066955e6a1d2444ba491b5e3c3149274665dac5
i386
cvs-1.11.22-11.el5.i386.rpm SHA-256: 791986af6c14ecd881b4f1b38bb7b4e6fabaa3d803ea6bc288028bf6feac7a88
cvs-inetd-1.11.22-11.el5.i386.rpm SHA-256: 4c11a4272d7f5c0d5fc59dd1d7a25f68ba3383f679fec48235606b22d0bbe52e

Red Hat Enterprise Linux Desktop 5

SRPM
cvs-1.11.22-11.el5.src.rpm SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2
x86_64
cvs-1.11.22-11.el5.x86_64.rpm SHA-256: f8dcf175d2dfd42e79c8242ec2d6ea5af358488ee7cf56af42f32b46f3f03e57
cvs-inetd-1.11.22-11.el5.x86_64.rpm SHA-256: 4b57a9336d1bf221b7ea729fc066955e6a1d2444ba491b5e3c3149274665dac5
i386
cvs-1.11.22-11.el5.i386.rpm SHA-256: 791986af6c14ecd881b4f1b38bb7b4e6fabaa3d803ea6bc288028bf6feac7a88
cvs-inetd-1.11.22-11.el5.i386.rpm SHA-256: 4c11a4272d7f5c0d5fc59dd1d7a25f68ba3383f679fec48235606b22d0bbe52e

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
cvs-1.11.22-11.el5.src.rpm SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2
s390x
cvs-1.11.22-11.el5.s390x.rpm SHA-256: 06c70a9a916b441ce0ac96cacbaf545762b2cfbe7d24f01e7586db89bb58cd2c
cvs-inetd-1.11.22-11.el5.s390x.rpm SHA-256: b864c8d69f04410bb0d084de081ae9dc74312f93beed9073d646e09e5fea3bd6

Red Hat Enterprise Linux for Power, big endian 5

SRPM
cvs-1.11.22-11.el5.src.rpm SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2
ppc
cvs-1.11.22-11.el5.ppc.rpm SHA-256: ba2afe6f26163b6a86701164e7842ea85d2c8c72c6708466f154fad55ef04bb8
cvs-inetd-1.11.22-11.el5.ppc.rpm SHA-256: ce1b924ba3379012ccac14eb91af87f7e0f3ba0b0f863af02c998ec478a8902d

Red Hat Enterprise Linux Server from RHUI 5

SRPM
cvs-1.11.22-11.el5.src.rpm SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2
x86_64
cvs-1.11.22-11.el5.x86_64.rpm SHA-256: f8dcf175d2dfd42e79c8242ec2d6ea5af358488ee7cf56af42f32b46f3f03e57
cvs-inetd-1.11.22-11.el5.x86_64.rpm SHA-256: 4b57a9336d1bf221b7ea729fc066955e6a1d2444ba491b5e3c3149274665dac5
i386
cvs-1.11.22-11.el5.i386.rpm SHA-256: 791986af6c14ecd881b4f1b38bb7b4e6fabaa3d803ea6bc288028bf6feac7a88
cvs-inetd-1.11.22-11.el5.i386.rpm SHA-256: 4c11a4272d7f5c0d5fc59dd1d7a25f68ba3383f679fec48235606b22d0bbe52e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility