OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   19-Mar-2003 16:02:22
  Branch: HEAD                             Handle: 2003031915022200

  Modified files:
    openpkg-web/security    OpenPKG-SA-2003.024-ircii.txt

  Log:
    final polishing and signing

  Summary:
    Revision    Changes     Path
    1.3         +22 -12     openpkg-web/security/OpenPKG-SA-2003.024-ircii.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.024-ircii.txt
  ============================================================================
  $ cvs diff -u -r1.2 -r1.3 OpenPKG-SA-2003.024-ircii.txt
  --- openpkg-web/security/OpenPKG-SA-2003.024-ircii.txt        19 Mar 2003 14:31:37 
-0000      1.2
  +++ openpkg-web/security/OpenPKG-SA-2003.024-ircii.txt        19 Mar 2003 15:02:22 
-0000      1.3
  @@ -1,3 +1,6 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
  +
   ________________________________________________________________________
   
   OpenPKG Security Advisory                            The OpenPKG Project
  @@ -20,23 +23,23 @@
   Description:
     Timo Sirainen audited ircII based clients [1] and found some buffer
     overflow vulnerabilities in ircii-20020912 [2]. According to his
  -  report these problems were fixed by in ircii-20030313.  We have
  -  backported the security relevant pieces of the more recent
  -  ircii-20030315 vendor changes into releases used by OpenPKG.
  -
  -  Please check whether you are affected by running "<prefix>/bin/rpm
  -  -q ircii". If you have the "ircii" package installed and its version
  -  is affected (see above), we recommend that you immediately upgrade
  -  it (see Solution). [3][4]
  +  report these problems were fixed in ircii-20030313. We have backported
  +  the security relevant pieces of the more recent ircii-20030315 vendor
  +  changes into releases used by OpenPKG.
  +
  +  Please check whether you are affected by running "<prefix>/bin/rpm -q
  +  ircii". If you have the "ircii" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
   
   Solution:
     Select the updated source RPM appropriate for your OpenPKG release
     [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
     location, verify its integrity [9], build a corresponding binary RPM
  -  from it [3] and update your OpenPKG installation by applying the binary
  -  RPM [4]. For the current release OpenPKG 1.2, perform the following
  -  operations to permanently fix the security problem (for other releases
  -  adjust accordingly).
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the current release OpenPKG 1.2, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
   
     $ ftp ftp.openpkg.org
     ftp> bin
  @@ -70,3 +73,10 @@
   the command "gpg --verify --keyserver keyserver.pgp.com".
   ________________________________________________________________________
   
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQE+eIZngHWT4GPEy58RAleYAJ4xmlL78sJFnmZ48XONR3NCTcxOTwCgrShv
  +PO52bUXnK9qzPMon2U9TXvo=
  +=Vnet
  +-----END PGP SIGNATURE-----
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to