Skip to navigation

Security Advisory Moderate: cscope security update

Advisory: RHSA-2009:1102-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-06-15
Last updated on: 2009-06-15
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2004-2541
CVE-2009-0148

Details

An updated cscope package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

cscope is a mature, ncurses-based, C source-code tree browsing tool.

Multiple buffer overflow flaws were found in cscope. An attacker could
create a specially crafted source code file that could cause cscope to
crash or, possibly, execute arbitrary code when browsed with cscope.
(CVE-2004-2541, CVE-2009-0148)

All users of cscope are advised to upgrade to this updated package, which
contains backported patches to fix these issues. All running instances of
cscope must be restarted for this update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
cscope-15.5-15.1.el5_3.1.src.rpm
File outdated by:  RHBA-2012:1137
    MD5: ed17c956d651cb2493a5d50e446888ac
 
IA-32:
cscope-15.5-15.1.el5_3.1.i386.rpm
File outdated by:  RHBA-2012:1137
    MD5: 058b20c7ee7885bf44b0106d19c907e0
 
x86_64:
cscope-15.5-15.1.el5_3.1.x86_64.rpm
File outdated by:  RHBA-2012:1137
    MD5: e3eff5dd94b88092f21367e593d29f75
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cscope-15.5-15.1.el5_3.1.src.rpm
File outdated by:  RHBA-2012:1137
    MD5: ed17c956d651cb2493a5d50e446888ac
 
IA-32:
cscope-15.5-15.1.el5_3.1.i386.rpm
File outdated by:  RHBA-2012:1137
    MD5: 058b20c7ee7885bf44b0106d19c907e0
 
IA-64:
cscope-15.5-15.1.el5_3.1.ia64.rpm
File outdated by:  RHBA-2012:1137
    MD5: d0691fa6a84fbc95606ad81f1f158405
 
PPC:
cscope-15.5-15.1.el5_3.1.ppc.rpm
File outdated by:  RHBA-2012:1137
    MD5: 991f791cae0931e2046886a87ccef6b4
 
s390x:
cscope-15.5-15.1.el5_3.1.s390x.rpm
File outdated by:  RHBA-2012:1137
    MD5: d394d50ab0a1382728f5769f2cfe46c3
 
x86_64:
cscope-15.5-15.1.el5_3.1.x86_64.rpm
File outdated by:  RHBA-2012:1137
    MD5: e3eff5dd94b88092f21367e593d29f75
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
cscope-15.5-15.1.el5_3.1.src.rpm
File outdated by:  RHBA-2012:1137
    MD5: ed17c956d651cb2493a5d50e446888ac
 
IA-32:
cscope-15.5-15.1.el5_3.1.i386.rpm     MD5: 058b20c7ee7885bf44b0106d19c907e0
 
IA-64:
cscope-15.5-15.1.el5_3.1.ia64.rpm     MD5: d0691fa6a84fbc95606ad81f1f158405
 
PPC:
cscope-15.5-15.1.el5_3.1.ppc.rpm     MD5: 991f791cae0931e2046886a87ccef6b4
 
s390x:
cscope-15.5-15.1.el5_3.1.s390x.rpm     MD5: d394d50ab0a1382728f5769f2cfe46c3
 
x86_64:
cscope-15.5-15.1.el5_3.1.x86_64.rpm     MD5: e3eff5dd94b88092f21367e593d29f75
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
cscope-15.5-15.1.el5_3.1.src.rpm
File outdated by:  RHBA-2012:1137
    MD5: ed17c956d651cb2493a5d50e446888ac
 
IA-32:
cscope-15.5-15.1.el5_3.1.i386.rpm     MD5: 058b20c7ee7885bf44b0106d19c907e0
 
IA-64:
cscope-15.5-15.1.el5_3.1.ia64.rpm     MD5: d0691fa6a84fbc95606ad81f1f158405
 
x86_64:
cscope-15.5-15.1.el5_3.1.x86_64.rpm     MD5: e3eff5dd94b88092f21367e593d29f75
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

490667 - CVE-2004-2541, CVE-2009-0148 cscope: multiple buffer overflows


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/