OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 15-Jan-2003 16:31:42 Branch: HEAD Handle: 2003011515314200 Modified files: openpkg-web/security OpenPKG-SA-0000.000-template.txt Log: backporting from latest SA Summary: Revision Changes Path 1.7 +41 -35 openpkg-web/security/OpenPKG-SA-0000.000-template.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-0000.000-template.txt ============================================================================ $ cvs diff -u -r1.6 -r1.7 OpenPKG-SA-0000.000-template.txt --- openpkg-web/security/OpenPKG-SA-0000.000-template.txt 15 Jan 2003 12:52:01 -0000 1.6 +++ openpkg-web/security/OpenPKG-SA-0000.000-template.txt 15 Jan 2003 15:31:42 -0000 1.7 @@ -3,64 +3,70 @@ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] -OpenPKG-SA-2003.xxx xx-xxx-2003 +OpenPKG-SA-2003.### DD-Mmm-2003 ________________________________________________________________________ Package: foo -Vulnerability: local root exploit +Vulnerability: crazy vulnerability OpenPKG Specific: no -Affected Releases: OpenPKG 1.0 OpenPKG 1.1 -Affected Packages: foo-1.2.0-1.0.0 foo-1.4.0-1.1.0 -Corrected Packages: foo-1.2.0-1.0.1 foo-1.4.0-1.1.1 -Dependent Packages: bar-1.0.0-1.0.0 bar-1.0.0-1.1.0 +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT <= foo-1.2.5-20021003 >= foo-1.2.5-20030115 +OpenPKG 1.1 <= foo-1.2.4-1.1.0 >= foo-1.2.4-1.1.1 +OpenPKG 1.0 <= foo-1.2.0-1.0.0 >= foo-1.2.0-1.0.1 + +Affected Releases: Dependent Packages: +OpenPKG CURRENT bar quux +OpenPKG 1.1 bar quux +OpenPKG 1.0 bar Description: - According to ... [7] ... + According to a ... security advisory based on hints from ... + [0], a crazy vulnerability exists in the + ... [1] .... + The Common Vulnerabilities and Exposures (CVE) project + assigned the id CAN-... [2] to the problem. - Please check whether you are affected by running "<prefix>/bin/rpm -qa - foo". If you have the "foo" package installed and its version + Please check whether you are affected by running "<prefix>/bin/rpm + -qa foo". If you have the "foo" package installed and its version is affected (see above), we recommend that you immediately upgrade - it (see Solution). Additionally, we recommend that you rebuild and - reinstall all dependent OpenPKG packages, too. [2] - -Workaround: - Perform the following operations to temporarily workaround the - security problem (be careful, it deactivates the whole service): - - $ su - - # <prefix>/etc/rc foo stop - # <prefix>/bin/rpm -e foo + it (see Solution) and it's dependent packages (see above), if any, + too. [3][4] Solution: Select the updated source RPM appropriate for your OpenPKG release - [5][6], fetch it from the OpenPKG FTP service [3][4] or a mirror - location, verify its integrity [1], build a corresponding binary RPM - from it and update your OpenPKG installation by applying the binary - RPM [2]. For the latest OpenPKG 1.1 release, perform the following + [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror + location, verify its integrity [9], build a corresponding binary RPM + from it [3] and update your OpenPKG installation by applying the binary + RPM [4]. For the current release OpenPKG 1.1, perform the following operations to permanently fix the security problem (for other releases adjust accordingly). $ ftp ftp.openpkg.org ftp> bin - ftp> cd release/1.0/UPD - ftp> get foo-1.2.0-1.0.1.src.rpm + ftp> cd release/1.1/UPD + ftp> get foo-1.2.4-1.1.1.src.rpm ftp> bye - $ <prefix>/bin/rpm -v --checksig foo-1.2.1-1.0.1.src.rpm - $ <prefix>/bin/rpm --rebuild foo-1.2.1-1.0.1.src.rpm + $ <prefix>/bin/rpm -v --checksig foo-1.2.4-1.1.1.src.rpm + $ <prefix>/bin/rpm --rebuild foo-1.2.4-1.1.1.src.rpm $ su - - # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/foo-1.2.1-1.0.1.*.rpm - # <prefix>/etc/rc foo stop start + # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/foo-1.2.4-1.1.1.*.rpm + + Additionally, we recommend that you rebuild and reinstall + all dependent packages (see above), if any, too. [3][4] ________________________________________________________________________ References: - [1] http://www.openpkg.org/security.html#signature - [2] http://www.openpkg.org/tutorial.html#regular-source - [3] ftp://ftp.openpkg.org/release/1.0/UPD/ - [4] ftp://ftp.openpkg.org/release/1.1/UPD/ + [0] http://www.example.com/bugfinder.html + [1] http://www.foo.org/ + [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-... + [3] http://www.openpkg.org/tutorial.html#regular-source + [4] http://www.openpkg.org/tutorial.html#regular-binary [5] ftp://ftp.openpkg.org/release/1.0/UPD/foo-1.2.0-1.0.1.src.rpm - [6] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.4.0-1.1.1.src.rpm - [7] ... BugTraq ... + [6] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.4-1.1.1.src.rpm + [7] ftp://ftp.openpkg.org/release/1.0/UPD/ + [8] ftp://ftp.openpkg.org/release/1.1/UPD/ + [9] http://www.openpkg.org/security.html#signature ________________________________________________________________________ For security reasons, this advisory was digitally signed with @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]