Skip to navigation

Security Advisory Moderate: cscope security update

Advisory: RHSA-2009:1101-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-06-15
Last updated on: 2009-06-15
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2004-2541
CVE-2006-4262
CVE-2009-0148
CVE-2009-1577

Details

An updated cscope package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

cscope is a mature, ncurses-based, C source-code tree browsing tool.

Multiple buffer overflow flaws were found in cscope. An attacker could
create a specially crafted source code file that could cause cscope to
crash or, possibly, execute arbitrary code when browsed with cscope.
(CVE-2004-2541, CVE-2006-4262, CVE-2009-0148, CVE-2009-1577)

All users of cscope are advised to upgrade to this updated package, which
contains backported patches to fix these issues. All running instances of
cscope must be restarted for this update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
cscope-15.5-16.RHEL3.src.rpm     MD5: 03eef82773958fb5f2b33e757e4d4535
 
IA-32:
cscope-15.5-16.RHEL3.i386.rpm     MD5: 41115bc287bb1df9531221cd84909e73
 
x86_64:
cscope-15.5-16.RHEL3.x86_64.rpm     MD5: 9d4f1a6671c4df3d0a629a4bffe9babe
 
Red Hat Desktop (v. 4)

SRPMS:
cscope-15.5-10.RHEL4.3.src.rpm     MD5: 153191c9b80974f1fdcb687cac8bbf2c
 
IA-32:
cscope-15.5-10.RHEL4.3.i386.rpm     MD5: 91f586c25359d4d021bd46ed2394c9b8
 
x86_64:
cscope-15.5-10.RHEL4.3.x86_64.rpm     MD5: fc605f3baee433c0b403516c593e25b4
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
cscope-15.5-16.RHEL3.src.rpm     MD5: 03eef82773958fb5f2b33e757e4d4535
 
IA-32:
cscope-15.5-16.RHEL3.i386.rpm     MD5: 41115bc287bb1df9531221cd84909e73
 
IA-64:
cscope-15.5-16.RHEL3.ia64.rpm     MD5: 1c706a48ef1b979d16df09ec0a5ac843
 
PPC:
cscope-15.5-16.RHEL3.ppc.rpm     MD5: 5c080f7317f8785aa2ed9254ffa04d10
 
s390:
cscope-15.5-16.RHEL3.s390.rpm     MD5: 3c0c746981b882a6ebc9a2fa6b11933f
 
s390x:
cscope-15.5-16.RHEL3.s390x.rpm     MD5: fce6eedae8ecaf1665ff8c7f185f1e34
 
x86_64:
cscope-15.5-16.RHEL3.x86_64.rpm     MD5: 9d4f1a6671c4df3d0a629a4bffe9babe
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
cscope-15.5-10.RHEL4.3.src.rpm     MD5: 153191c9b80974f1fdcb687cac8bbf2c
 
IA-32:
cscope-15.5-10.RHEL4.3.i386.rpm     MD5: 91f586c25359d4d021bd46ed2394c9b8
 
IA-64:
cscope-15.5-10.RHEL4.3.ia64.rpm     MD5: 0cf81935839d60d57e1436e1992e7d14
 
PPC:
cscope-15.5-10.RHEL4.3.ppc.rpm     MD5: a93196481d4c1a0730d7beee7c3edb9d
 
s390:
cscope-15.5-10.RHEL4.3.s390.rpm     MD5: 2fa0a564a497f3f9a14c768fa094c4e3
 
s390x:
cscope-15.5-10.RHEL4.3.s390x.rpm     MD5: ea4050071c94e97d49bcb073b4d1826f
 
x86_64:
cscope-15.5-10.RHEL4.3.x86_64.rpm     MD5: fc605f3baee433c0b403516c593e25b4
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
cscope-15.5-10.RHEL4.3.src.rpm     MD5: 153191c9b80974f1fdcb687cac8bbf2c
 
IA-32:
cscope-15.5-10.RHEL4.3.i386.rpm     MD5: 91f586c25359d4d021bd46ed2394c9b8
 
IA-64:
cscope-15.5-10.RHEL4.3.ia64.rpm     MD5: 0cf81935839d60d57e1436e1992e7d14
 
PPC:
cscope-15.5-10.RHEL4.3.ppc.rpm     MD5: a93196481d4c1a0730d7beee7c3edb9d
 
s390:
cscope-15.5-10.RHEL4.3.s390.rpm     MD5: 2fa0a564a497f3f9a14c768fa094c4e3
 
s390x:
cscope-15.5-10.RHEL4.3.s390x.rpm     MD5: ea4050071c94e97d49bcb073b4d1826f
 
x86_64:
cscope-15.5-10.RHEL4.3.x86_64.rpm     MD5: fc605f3baee433c0b403516c593e25b4
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
cscope-15.5-16.RHEL3.src.rpm     MD5: 03eef82773958fb5f2b33e757e4d4535
 
IA-32:
cscope-15.5-16.RHEL3.i386.rpm     MD5: 41115bc287bb1df9531221cd84909e73
 
IA-64:
cscope-15.5-16.RHEL3.ia64.rpm     MD5: 1c706a48ef1b979d16df09ec0a5ac843
 
x86_64:
cscope-15.5-16.RHEL3.x86_64.rpm     MD5: 9d4f1a6671c4df3d0a629a4bffe9babe
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
cscope-15.5-10.RHEL4.3.src.rpm     MD5: 153191c9b80974f1fdcb687cac8bbf2c
 
IA-32:
cscope-15.5-10.RHEL4.3.i386.rpm     MD5: 91f586c25359d4d021bd46ed2394c9b8
 
IA-64:
cscope-15.5-10.RHEL4.3.ia64.rpm     MD5: 0cf81935839d60d57e1436e1992e7d14
 
x86_64:
cscope-15.5-10.RHEL4.3.x86_64.rpm     MD5: fc605f3baee433c0b403516c593e25b4
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
cscope-15.5-10.RHEL4.3.src.rpm     MD5: 153191c9b80974f1fdcb687cac8bbf2c
 
IA-32:
cscope-15.5-10.RHEL4.3.i386.rpm     MD5: 91f586c25359d4d021bd46ed2394c9b8
 
IA-64:
cscope-15.5-10.RHEL4.3.ia64.rpm     MD5: 0cf81935839d60d57e1436e1992e7d14
 
x86_64:
cscope-15.5-10.RHEL4.3.x86_64.rpm     MD5: fc605f3baee433c0b403516c593e25b4
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
cscope-15.5-16.RHEL3.src.rpm     MD5: 03eef82773958fb5f2b33e757e4d4535
 
IA-32:
cscope-15.5-16.RHEL3.i386.rpm     MD5: 41115bc287bb1df9531221cd84909e73
 
IA-64:
cscope-15.5-16.RHEL3.ia64.rpm     MD5: 1c706a48ef1b979d16df09ec0a5ac843
 
x86_64:
cscope-15.5-16.RHEL3.x86_64.rpm     MD5: 9d4f1a6671c4df3d0a629a4bffe9babe
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
cscope-15.5-10.RHEL4.3.src.rpm     MD5: 153191c9b80974f1fdcb687cac8bbf2c
 
IA-32:
cscope-15.5-10.RHEL4.3.i386.rpm     MD5: 91f586c25359d4d021bd46ed2394c9b8
 
IA-64:
cscope-15.5-10.RHEL4.3.ia64.rpm     MD5: 0cf81935839d60d57e1436e1992e7d14
 
x86_64:
cscope-15.5-10.RHEL4.3.x86_64.rpm     MD5: fc605f3baee433c0b403516c593e25b4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

203645 - CVE-2006-4262 cscope: multiple buffer overflows
490667 - CVE-2004-2541, CVE-2009-0148 cscope: multiple buffer overflows
499174 - CVE-2009-1577 cscope: putstring buffer overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/