Package: gcvs
Severity: normal
Tags: security

Gcvs, since it uses the CVS sources, is missing patches for some security
issues, such as CAN-2005-0753. Even though the program itself might not
be vulnerable to the remote buffer overflow it might be appropiate to fix
them since the fixes include some NULL pointer dereferences and such that
might lead to core dumps. That's why I'm listing this bug as normal and not
of higher priority.

In view of this, the following claim in the debian/control is not be true:

  - Uses the latest CVS source code

At the same time, you might want to consider the recommendations I made 
in #325109, quoting from there:

"OWL, a security oriented distribution, ships a number of patches for CVS
that might be interesting to review and apply, if they do apply, check out
http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/cvs/2

Regards


Javier

[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753

Attachment: signature.asc
Description: Digital signature

Reply via email to