FreeBSD Security Advisory FreeBSD-SA-05:20.cvsbug [REVISED]

From: FreeBSD Security Advisories (
Date: 09/09/05

  • Next message: Martin Schulze: "[SECURITY] [DSA 807-1] New mod_ssl packages fix acl restriction bypass"
    Date: Fri, 9 Sep 2005 19:34:11 GMT
    To: Bugtraq <>

    Hash: SHA1

    FreeBSD-SA-05:20.cvsbug Security Advisory
                                                              The FreeBSD Project

    Topic: Race condition in cvsbug

    Category: contrib
    Module: contrib_cvs
    Announced: 2005-09-07
    Credits: Marcus Meissner
    Affects: All FreeBSD releases
    Corrected: 2005-09-07 13:43:05 UTC (RELENG_6, 6.0-BETA5)
                    2005-09-07 13:43:23 UTC (RELENG_5, 5.4-STABLE)
                    2005-09-07 13:43:36 UTC (RELENG_5_4, 5.4-RELEASE-p7)
                    2005-09-09 19:26:19 UTC (RELENG_5_3, 5.3-RELEASE-p22)
                    2005-09-07 13:44:06 UTC (RELENG_4, 4.11-STABLE)
                    2005-09-07 13:44:20 UTC (RELENG_4_11, 4.11-RELEASE-p12)
                    2005-09-09 19:24:22 UTC (RELENG_4_10, 4.10-RELEASE-p18)
    CVE Name: CAN-2005-2693

    For general information regarding FreeBSD Security Advisories,
    including descriptions of the fields above, security branches, and the
    following sections, please visit

    0. Revision History

    v1.0 2005-07-07 Initial release.
    v1.1 2005-07-09 Additional related issues fixed in FreeBSD 4.10 and 5.3.

    I. Background

    cvsbug(1) is a utility for reporting problems in the CVS revision
    control system. It is based on the GNATS send-pr(1) utility.

    II. Problem Description

    A temporary file is created, used, deleted, and then re-created with
    the same name. This creates a window during which an attacker could
    replace the file with a link to another file. While cvsbug(1) is based
    on the send-pr(1) utility, this problem does not exist in the version
    of send-pr(1) distributed with FreeBSD.

    In FreeBSD 4.10 and 5.3, some additional problems exist concerning
    temporary file usage in both cvsbug(1) and send-pr(1).

    III. Impact

    A local attacker could cause data to be written to any file to which
    the user running cvsbug(1) (or send-pr(1) in FreeBSD 4.10 and 5.3) has
    write access. This may cause damage in itself (e.g., by destroying
    important system files or documents) or may be used to obtain elevated

    IV. Workaround

    Do not use the cvsbug(1) utility on any system with untrusted users.

    Do not use the send-pr(1) utility on a FreeBSD 4.10 or 5.3 system with
    untrusted users.

    V. Solution

    Perform one of the following:

    1) Upgrade your vulnerable system to 4-STABLE or 5-STABLE, or to the
    RELENG_5_4, RELENG_5_3, RELENG_4_11, or RELENG_4_10 security branch
    dated after the correction date.

    2) To patch your present system:

    The following patches have been verified to apply to FreeBSD 4.10,
    4.11, 5.3, and 5.4 systems.

    a) Download the relevant patch from the location below, and verify the
    detached PGP signature using your PGP utility.

    [FreeBSD 4.10]
    # fetch
    # fetch

    [FreeBSD 5.3]
    # fetch
    # fetch

    [FreeBSD 4.11 and 5.4]
    # fetch
    # fetch

    b) Execute the following commands as root:

    # cd /usr/src
    # patch < /path/to/patch
    # cd /usr/src/gnu/usr.bin/cvs/cvsbug
    # make obj && make depend && make && make install
    # cd /usr/src/gnu/usr.bin/send-pr
    # make obj && make depend && make && make install

    VI. Correction details

    The following list contains the revision numbers of each file that was
    corrected in FreeBSD.

    Branch Revision
    - -------------------------------------------------------------------------
      src/UPDATING 1.342.
      src/UPDATING 1.342.
    - -------------------------------------------------------------------------

    VII. References

    The latest revision of this advisory is available at
    Version: GnuPG v1.4.1 (FreeBSD)

    -----END PGP SIGNATURE-----

  • Next message: Martin Schulze: "[SECURITY] [DSA 807-1] New mod_ssl packages fix acl restriction bypass"

    Relevant Pages