- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0253 - cvs bug fix update
Synopsis
cvs bug fix update
Type/Severity
Bug Fix Advisory (none)
Topic
Updated cvs packages that fix two bugs are now available for Red Hat Enterprise Linux 5.
Description
The Concurrent Versions System (CVS) is a version control system that can record the history of your files. CVS only stores the differences between versions, instead of every version of every file you have ever created. CVS also keeps a log of who, when, and why changes occurred.
This update fixes the following bugs:
-
Previously, the CVS server did not pass the client address to the Pluggable Authentication Modules (PAM) system. As a result, it was not possible to distinguish clients by the network address with the PAM system and the system was not able to utilize the client address and use it for the authentication or authorization purposes. With this update, the client network address is passed to the PAM subsystem as a remote host item (PAM_RHOST). Also, the terminal item (PAM_TTY) is set to a dummy value "cvs" because some PAM modules cannot work with an unset value. (BZ#538376)
-
Previously, when using the "cvs rtag" command with a repository, which included the "." character in the repository path, the CVS server hit the assertion test and terminated. With this update, the assertion check for "." in the CVSROOT path has been removed as CVS can process this path safely now so that "cvs rtag" works with repositories with "." in the CVSROOT path as expected. (BZ#769298)
All CVS users are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/kb/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux for IBM z Systems | 5 | s390x |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 5 | i386 |
| Red Hat Enterprise Linux Desktop | 5 | x86_64 |
| Red Hat Enterprise Linux Desktop | 5 | i386 |
Updated Packages
- cvs-inetd-1.11.22-11.el5.i386.rpm
- cvs-inetd-1.11.22-11.el5.ppc.rpm
- cvs-inetd-1.11.22-11.el5.s390x.rpm
- cvs-inetd-1.11.22-11.el5.x86_64.rpm
- cvs-1.11.22-11.el5.s390x.rpm
- cvs-1.11.22-11.el5.ppc.rpm
- cvs-1.11.22-11.el5.ia64.rpm
- cvs-1.11.22-11.el5.i386.rpm
- cvs-inetd-1.11.22-11.el5.ia64.rpm
- cvs-1.11.22-11.el5.x86_64.rpm
- cvs-1.11.22-11.el5.src.rpm
Fixes
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.