OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 03-Jun-2003 15:48:16 Branch: HEAD Handle: 2003060314481600 Modified files: openpkg-web/security OpenPKG-SA-0000.000-template.txt Log: back out change until we really have such a revoke functionality Summary: Revision Changes Path 1.12 +12 -17 openpkg-web/security/OpenPKG-SA-0000.000-template.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-0000.000-template.txt ============================================================================ $ cvs diff -u -r1.11 -r1.12 OpenPKG-SA-0000.000-template.txt --- openpkg-web/security/OpenPKG-SA-0000.000-template.txt 9 Apr 2003 15:08:39 -0000 1.11 +++ openpkg-web/security/OpenPKG-SA-0000.000-template.txt 3 Jun 2003 13:48:16 -0000 1.12 @@ -34,13 +34,9 @@ too. [3][4] Solution: - First, please avoid applying an obsolete security update by ensuring - that a more recent one doesn't exist. Also, ensure that this advisory - has not been revoked by visiting the OpenPKG security page [5]. - Select the updated source RPM appropriate for your OpenPKG release - [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror - location, verify its integrity [10], build a corresponding binary RPM + [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror + location, verify its integrity [9], build a corresponding binary RPM from it [3] and update your OpenPKG installation by applying the binary RPM [4]. For the current release OpenPKG 1.2, perform the following operations to permanently fix the security problem (for other releases @@ -61,17 +57,16 @@ ________________________________________________________________________ References: - [0] http://www.example.com/bugfinder.html - [1] http://www.foo.org/ - [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-... - [3] http://www.openpkg.org/tutorial.html#regular-source - [4] http://www.openpkg.org/tutorial.html#regular-binary - [5] http://www.openpkg.org/security.html#revoked - [6] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm - [7] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm - [8] ftp://ftp.openpkg.org/release/1.1/UPD/ - [9] ftp://ftp.openpkg.org/release/1.2/UPD/ - [10] http://www.openpkg.org/security.html#signature + [0] http://www.example.com/bugfinder.html + [1] http://www.foo.org/ + [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-... + [3] http://www.openpkg.org/tutorial.html#regular-source + [4] http://www.openpkg.org/tutorial.html#regular-binary + [5] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm + [6] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm + [7] ftp://ftp.openpkg.org/release/1.1/UPD/ + [8] ftp://ftp.openpkg.org/release/1.2/UPD/ + [9] http://www.openpkg.org/security.html#signature ________________________________________________________________________ For security reasons, this advisory was digitally signed with the @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]