- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0253 - Bug Fix Advisory
Synopsis
cvs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cvs packages that fix two bugs are now available for Red Hat Enterprise
Linux 5.
Description
The Concurrent Versions System (CVS) is a version control system that can record
the history of your files. CVS only stores the differences between versions,
instead of every version of every file you have ever created. CVS also keeps a
log of who, when, and why changes occurred.
This update fixes the following bugs:
- Previously, the CVS server did not pass the client address to the Pluggable
Authentication Modules (PAM) system. As a result, it was not possible to
distinguish clients by the network address with the PAM system and the system
was not able to utilize the client address and use it for the authentication or
authorization purposes. With this update, the client network address is passed
to the PAM subsystem as a remote host item (PAM_RHOST). Also, the terminal item
(PAM_TTY) is set to a dummy value "cvs" because some PAM modules cannot work
with an unset value. (BZ#538376)
- Previously, when using the "cvs rtag" command with a repository, which
included the "." character in the repository path, the CVS server hit the
assertion test and terminated. With this update, the assertion check for "." in
the CVSROOT path has been removed as CVS can process this path safely now so
that "cvs rtag" works with repositories with "." in the CVSROOT path as
expected. (BZ#769298)
All CVS users are advised to upgrade to these updated packages, which fix these
bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 538376 - CVS PAM authentication does not support RHOST item
- BZ - 769298 - cvs assertion failure
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cvs-1.11.22-11.el5.src.rpm | SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2 |
x86_64 | |
cvs-1.11.22-11.el5.x86_64.rpm | SHA-256: f8dcf175d2dfd42e79c8242ec2d6ea5af358488ee7cf56af42f32b46f3f03e57 |
cvs-inetd-1.11.22-11.el5.x86_64.rpm | SHA-256: 4b57a9336d1bf221b7ea729fc066955e6a1d2444ba491b5e3c3149274665dac5 |
ia64 | |
cvs-1.11.22-11.el5.ia64.rpm | SHA-256: 523f10b99050a46bb4be1878d4f08d8d477652240b59218233e184018f7a5892 |
cvs-inetd-1.11.22-11.el5.ia64.rpm | SHA-256: f619607945c341d25023b9feb976c50692ba98853212eeb59a68586da0622b6f |
i386 | |
cvs-1.11.22-11.el5.i386.rpm | SHA-256: 791986af6c14ecd881b4f1b38bb7b4e6fabaa3d803ea6bc288028bf6feac7a88 |
cvs-inetd-1.11.22-11.el5.i386.rpm | SHA-256: 4c11a4272d7f5c0d5fc59dd1d7a25f68ba3383f679fec48235606b22d0bbe52e |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cvs-1.11.22-11.el5.src.rpm | SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2 |
x86_64 | |
cvs-1.11.22-11.el5.x86_64.rpm | SHA-256: f8dcf175d2dfd42e79c8242ec2d6ea5af358488ee7cf56af42f32b46f3f03e57 |
cvs-inetd-1.11.22-11.el5.x86_64.rpm | SHA-256: 4b57a9336d1bf221b7ea729fc066955e6a1d2444ba491b5e3c3149274665dac5 |
i386 | |
cvs-1.11.22-11.el5.i386.rpm | SHA-256: 791986af6c14ecd881b4f1b38bb7b4e6fabaa3d803ea6bc288028bf6feac7a88 |
cvs-inetd-1.11.22-11.el5.i386.rpm | SHA-256: 4c11a4272d7f5c0d5fc59dd1d7a25f68ba3383f679fec48235606b22d0bbe52e |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
cvs-1.11.22-11.el5.src.rpm | SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2 |
x86_64 | |
cvs-1.11.22-11.el5.x86_64.rpm | SHA-256: f8dcf175d2dfd42e79c8242ec2d6ea5af358488ee7cf56af42f32b46f3f03e57 |
cvs-inetd-1.11.22-11.el5.x86_64.rpm | SHA-256: 4b57a9336d1bf221b7ea729fc066955e6a1d2444ba491b5e3c3149274665dac5 |
i386 | |
cvs-1.11.22-11.el5.i386.rpm | SHA-256: 791986af6c14ecd881b4f1b38bb7b4e6fabaa3d803ea6bc288028bf6feac7a88 |
cvs-inetd-1.11.22-11.el5.i386.rpm | SHA-256: 4c11a4272d7f5c0d5fc59dd1d7a25f68ba3383f679fec48235606b22d0bbe52e |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
cvs-1.11.22-11.el5.src.rpm | SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2 |
s390x | |
cvs-1.11.22-11.el5.s390x.rpm | SHA-256: 06c70a9a916b441ce0ac96cacbaf545762b2cfbe7d24f01e7586db89bb58cd2c |
cvs-inetd-1.11.22-11.el5.s390x.rpm | SHA-256: b864c8d69f04410bb0d084de081ae9dc74312f93beed9073d646e09e5fea3bd6 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cvs-1.11.22-11.el5.src.rpm | SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2 |
ppc | |
cvs-1.11.22-11.el5.ppc.rpm | SHA-256: ba2afe6f26163b6a86701164e7842ea85d2c8c72c6708466f154fad55ef04bb8 |
cvs-inetd-1.11.22-11.el5.ppc.rpm | SHA-256: ce1b924ba3379012ccac14eb91af87f7e0f3ba0b0f863af02c998ec478a8902d |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
cvs-1.11.22-11.el5.src.rpm | SHA-256: e68422ccfbcb739d3a329c555834de763c49b0a9948834d6f48c58a2bdca60e2 |
x86_64 | |
cvs-1.11.22-11.el5.x86_64.rpm | SHA-256: f8dcf175d2dfd42e79c8242ec2d6ea5af358488ee7cf56af42f32b46f3f03e57 |
cvs-inetd-1.11.22-11.el5.x86_64.rpm | SHA-256: 4b57a9336d1bf221b7ea729fc066955e6a1d2444ba491b5e3c3149274665dac5 |
i386 | |
cvs-1.11.22-11.el5.i386.rpm | SHA-256: 791986af6c14ecd881b4f1b38bb7b4e6fabaa3d803ea6bc288028bf6feac7a88 |
cvs-inetd-1.11.22-11.el5.i386.rpm | SHA-256: 4c11a4272d7f5c0d5fc59dd1d7a25f68ba3383f679fec48235606b22d0bbe52e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.