DSA-806-1 gcvs -- insecure temporary files

Related Vulnerabilities: CVE-2005-2693  

Marcus Meissner discovered that the cvsbug program from gcvs, the Graphical frontend for CVS, which serves the popular Concurrent Versions System, uses temporary files in an insecure fashion. For the old stable distribution (woody) this problem has been fixed in version 1.0a7-2woody1. For the stable distribution (sarge) this problem has been fixed in version 1.0final-5sarge1. The unstable distribution (sid) does not expose the cvsbug program. We recommend that you upgrade your gcvs package.

Debian Security Advisory

DSA-806-1 gcvs -- insecure temporary files

Date Reported:
09 Sep 2005
Affected Packages:
cvs
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 325106.
In Mitre's CVE dictionary: CVE-2005-2693.
More information:

Marcus Meissner discovered that the cvsbug program from gcvs, the Graphical frontend for CVS, which serves the popular Concurrent Versions System, uses temporary files in an insecure fashion.

For the old stable distribution (woody) this problem has been fixed in version 1.0a7-2woody1.

For the stable distribution (sarge) this problem has been fixed in version 1.0final-5sarge1.

The unstable distribution (sid) does not expose the cvsbug program.

We recommend that you upgrade your gcvs package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1.dsc
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1.diff.gz
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0a7-2woody1_sparc.deb

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1.dsc
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1.diff.gz
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/g/gcvs/gcvs_1.0final-5sarge1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.