OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   23-Jan-2003 11:36:10
  Branch: HEAD                             Handle: 2003012310361000

  Modified files:
    openpkg-web/security    OpenPKG-SA-2003.006-python.txt

  Log:
    final polishing and signing

  Summary:
    Revision    Changes     Path
    1.3         +20 -11     openpkg-web/security/OpenPKG-SA-2003.006-python.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.006-python.txt
  ============================================================================
  $ cvs diff -u -r1.2 -r1.3 OpenPKG-SA-2003.006-python.txt
  --- openpkg-web/security/OpenPKG-SA-2003.006-python.txt       23 Jan 2003 10:26:39 
-0000      1.2
  +++ openpkg-web/security/OpenPKG-SA-2003.006-python.txt       23 Jan 2003 10:36:10 
-0000      1.3
  @@ -1,3 +1,6 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
  +
   ________________________________________________________________________
   
   OpenPKG Security Advisory                            The OpenPKG Project
  @@ -7,7 +10,7 @@
   ________________________________________________________________________
   
   Package:             python
  -Vulnerability:       predictable filename allows arbitrary code execution 
  +Vulnerability:       predictable filename allows arbitrary code execution
   OpenPKG Specific:    no
   
   Affected Releases:   Affected Packages:          Corrected Packages:
  @@ -19,18 +22,17 @@
   
   Description:
     Zack Weinberg discovered an insecure use of a predictable file name
  -  [0] in Python, a interpreted, interactive, object-oriented programming
  -  language [1]. Python attempts to exec a file which does not exist just
  -  to find out what error the operating system returns. It uses a
  -  constant filename for this task which could lead to execution of
  -  arbitrary code.  The Common Vulnerabilities and Exposures (CVE)
  -  project assigned the id CAN-2002-1119 [2] to the problem.
  +  [0] in the Python programming language [1]. Python attempts to execute
  +  a file which is assumed to not exist just to find out what error
  +  the operating system returns in this situation. It uses a constant
  +  filename for this task which could lead to the execution of arbitrary
  +  code. The Common Vulnerabilities and Exposures (CVE) project assigned
  +  the id CAN-2002-1119 [2] to the problem.
   
     Please check whether you are affected by running "<prefix>/bin/rpm -q
  -  python". If you have the "python" package installed and its version is
  -  affected (see above), we recommend that you immediately upgrade it
  -  (see Solution) and it's dependent packages (see above), if any, too.
  -  [3][4]
  +  python". If you have the "python" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
   
   Solution:
     Select the updated source RPM appropriate for your OpenPKG release
  @@ -72,3 +74,10 @@
   the command "gpg --verify --keyserver keyserver.pgp.com".
   ________________________________________________________________________
   
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQE+L8WAgHWT4GPEy58RAtl5AJ40nGCQKxI5yrs4KnKMaRI5veFM4ACePHmi
  +z8mwYutcBLXjOsWlMf5CEZM=
  +=OSaV
  +-----END PGP SIGNATURE-----
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to