Package: gcvs
Severity: normal
Tags: security

[Using weird severity for security report because the possibly-vulnerable
code isn't in a place where it's likely to executed by accident.  If we
have a policy for this case that I don't know about, please enlighten me.]

Fedora Core recently put out an advisory[1] on a tempfile race in the
"cvsbug" script, which ships as part of the CVS upstream release (but is
not present in Debian's packaging).

gcvs, however, does ship the file in its examples directory.  Since
examples are things one normally expects people to follow (unless
prominently marked otherwise), it's probably a bad idea to teach people bad
security practices.

We should likely either:
1) Patch the copy of cvsbug to fix the vulnerability; or
2) Stop shipping cvsbug altogether.

On IRC, Martin Pitt advised me that he prefers the latter, for what it's
worth.

There's a patch in Red Hat's Bugzilla[2].

[1] http://lwn.net/Alerts/148865/
[2] https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166366

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.9-powerpc-smp
Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to