Bug Fix Advisory cvs bug fix and enhancement update

Advisory: RHBA-2013:1555-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated cvs packages that fix one bug and add one enhancement are now available
for Red Hat Enterprise Linux 6.

The Concurrent Versions System (CVS) is a version control system that can record
the history of your files. CVS only stores the differences between versions,
instead of every version of every file you have ever created. CVS also keeps a
log of who, when, and why changes occurred.

This update fixes the following bug:

* When a CVS client tried to establish a GSSAPI-authenticated connection to a
DNS load-balanced cluster node, the authentication failed because each node had
a unique host name. With this update, the GSSAPI CVS server has been modified to
search for any Kerberos key that matches the "cvs" service and any host name. As
a result, the CVS server can now authenticate clients using GSSAPI even if the
server's host name does not match the domain name, and thus Kerberos principal
host name part, common for all cluster nodes. CVS server administrators are
advised to deploy two Kerberos principals to each node: a principal matching the
node's host name and a principal matching the cluster's domain name. (BZ#671460)

In addition, this update adds the following enhancement:

* Previously, the CVS server did not pass the client address to the Pluggable
Authentication Modules (PAM) system. As a consequence, it was not possible to
distinguish clients by the network address with the PAM system and the system
was not able to utilize the client address for authentication or authorization
purposes. With this update, the client network address is passed to the PAM
subsystem as a remote host item (PAM_RHOST). Also, the terminal item (PAM_TTY)
is set to a dummy value "cvs" because some PAM modules cannot work with an unset
value. (BZ#684789)

Users of cvs are advised to upgrade to these updated packages, which fix this
bug and add this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
cvs-1.11.23-16.el6.src.rpm     MD5: c87f6cd0ca783d10cba8c839b862c49e
SHA-256: 54921a3b5d05c3838b3dc1eaa01f0c5287dcc99610fb660bb3de719110704a06
 
IA-32:
cvs-1.11.23-16.el6.i686.rpm     MD5: 6205bb40e911f5bedaecf0bfdcdd6081
SHA-256: a3592bd93c33be34d8f7aa953014578bf85afb0bdef72cbcbfe804e6b6e6bc25
cvs-debuginfo-1.11.23-16.el6.i686.rpm     MD5: b68120173eb4312d53da8fe3a552987d
SHA-256: e7183846cf61d50eeadee87e7fbd4b60a8cb7af3a392a7f6b9dba5a200f0900f
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
x86_64:
cvs-1.11.23-16.el6.x86_64.rpm     MD5: b6fe66f12891bc18a42e41c2fd57c66c
SHA-256: 1a5b881c501a08b9ba539b5a252f0b4bdc2e9a10bf6addcacd76f33103d2194d
cvs-debuginfo-1.11.23-16.el6.x86_64.rpm     MD5: 7bbf60e832f03538920d2f18e0fc754a
SHA-256: 11c832c4579165ecfa72363a4902f9f779ff3f391c349a88459490149c9e76d6
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
cvs-1.11.23-16.el6.src.rpm     MD5: c87f6cd0ca783d10cba8c839b862c49e
SHA-256: 54921a3b5d05c3838b3dc1eaa01f0c5287dcc99610fb660bb3de719110704a06
 
x86_64:
cvs-1.11.23-16.el6.x86_64.rpm     MD5: b6fe66f12891bc18a42e41c2fd57c66c
SHA-256: 1a5b881c501a08b9ba539b5a252f0b4bdc2e9a10bf6addcacd76f33103d2194d
cvs-debuginfo-1.11.23-16.el6.x86_64.rpm     MD5: 7bbf60e832f03538920d2f18e0fc754a
SHA-256: 11c832c4579165ecfa72363a4902f9f779ff3f391c349a88459490149c9e76d6
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
cvs-1.11.23-16.el6.src.rpm     MD5: c87f6cd0ca783d10cba8c839b862c49e
SHA-256: 54921a3b5d05c3838b3dc1eaa01f0c5287dcc99610fb660bb3de719110704a06
 
IA-32:
cvs-1.11.23-16.el6.i686.rpm     MD5: 6205bb40e911f5bedaecf0bfdcdd6081
SHA-256: a3592bd93c33be34d8f7aa953014578bf85afb0bdef72cbcbfe804e6b6e6bc25
cvs-debuginfo-1.11.23-16.el6.i686.rpm     MD5: b68120173eb4312d53da8fe3a552987d
SHA-256: e7183846cf61d50eeadee87e7fbd4b60a8cb7af3a392a7f6b9dba5a200f0900f
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
PPC:
cvs-1.11.23-16.el6.ppc64.rpm     MD5: 224d95dac526fd7fc18467ca3dbb4c63
SHA-256: 68e408b58781377767539b45d95f6315eee664bf7972f5fa7de4de3edc078d50
cvs-debuginfo-1.11.23-16.el6.ppc64.rpm     MD5: a737364866fc11f30c0cc11229ffc300
SHA-256: 69bc58e8c8671c00be255279c208fd1f842c381f2a4eb38d5ca30df53ff67a77
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
s390x:
cvs-1.11.23-16.el6.s390x.rpm     MD5: d17b27a2e9d33fb275cda2f9728f4434
SHA-256: e6b32431efc64239cc2e2376f0dc318035f1327fb2d5f9cefdcc9ed671c31ebc
cvs-debuginfo-1.11.23-16.el6.s390x.rpm     MD5: a2523f553e1a01df5d4227f14a9b1d19
SHA-256: dda060af902319c4019dec4becd4e31592fffebda392440933725f6268237be0
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
x86_64:
cvs-1.11.23-16.el6.x86_64.rpm     MD5: b6fe66f12891bc18a42e41c2fd57c66c
SHA-256: 1a5b881c501a08b9ba539b5a252f0b4bdc2e9a10bf6addcacd76f33103d2194d
cvs-debuginfo-1.11.23-16.el6.x86_64.rpm     MD5: 7bbf60e832f03538920d2f18e0fc754a
SHA-256: 11c832c4579165ecfa72363a4902f9f779ff3f391c349a88459490149c9e76d6
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
cvs-1.11.23-16.el6.src.rpm     MD5: c87f6cd0ca783d10cba8c839b862c49e
SHA-256: 54921a3b5d05c3838b3dc1eaa01f0c5287dcc99610fb660bb3de719110704a06
 
IA-32:
cvs-1.11.23-16.el6.i686.rpm     MD5: 6205bb40e911f5bedaecf0bfdcdd6081
SHA-256: a3592bd93c33be34d8f7aa953014578bf85afb0bdef72cbcbfe804e6b6e6bc25
cvs-debuginfo-1.11.23-16.el6.i686.rpm     MD5: b68120173eb4312d53da8fe3a552987d
SHA-256: e7183846cf61d50eeadee87e7fbd4b60a8cb7af3a392a7f6b9dba5a200f0900f
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
x86_64:
cvs-1.11.23-16.el6.x86_64.rpm     MD5: b6fe66f12891bc18a42e41c2fd57c66c
SHA-256: 1a5b881c501a08b9ba539b5a252f0b4bdc2e9a10bf6addcacd76f33103d2194d
cvs-debuginfo-1.11.23-16.el6.x86_64.rpm     MD5: 7bbf60e832f03538920d2f18e0fc754a
SHA-256: 11c832c4579165ecfa72363a4902f9f779ff3f391c349a88459490149c9e76d6
cvs-inetd-1.11.23-16.el6.noarch.rpm     MD5: 2534f7ec9dd41ad359bed9cb0cc63c92
SHA-256: 350b64d81a6143357654871411335ec9181f84d65ec6f02fca7a47a9d1699d24
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

671460 - Missing patch to support CVS/GSSAPI with DNS-loadbalanced clusters
684789 - CVS PAM authentication does not support RHOST item



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/