OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Michael Schloh Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 09-Apr-2003 17:08:40 Branch: HEAD Handle: 2003040916083900 Modified files: openpkg-web/security OpenPKG-SA-0000.000-template.txt Log: Incorporate suggestions by Thomas LOTTERER. Summary: Revision Changes Path 1.11 +17 -12 openpkg-web/security/OpenPKG-SA-0000.000-template.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-0000.000-template.txt ============================================================================ $ cvs diff -u -r1.10 -r1.11 OpenPKG-SA-0000.000-template.txt --- openpkg-web/security/OpenPKG-SA-0000.000-template.txt 30 Mar 2003 11:26:38 -0000 1.10 +++ openpkg-web/security/OpenPKG-SA-0000.000-template.txt 9 Apr 2003 15:08:39 -0000 1.11 @@ -34,9 +34,13 @@ too. [3][4] Solution: + First, please avoid applying an obsolete security update by ensuring + that a more recent one doesn't exist. Also, ensure that this advisory + has not been revoked by visiting the OpenPKG security page [5]. + Select the updated source RPM appropriate for your OpenPKG release - [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror - location, verify its integrity [9], build a corresponding binary RPM + [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror + location, verify its integrity [10], build a corresponding binary RPM from it [3] and update your OpenPKG installation by applying the binary RPM [4]. For the current release OpenPKG 1.2, perform the following operations to permanently fix the security problem (for other releases @@ -57,16 +61,17 @@ ________________________________________________________________________ References: - [0] http://www.example.com/bugfinder.html - [1] http://www.foo.org/ - [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-... - [3] http://www.openpkg.org/tutorial.html#regular-source - [4] http://www.openpkg.org/tutorial.html#regular-binary - [5] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm - [6] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm - [7] ftp://ftp.openpkg.org/release/1.1/UPD/ - [8] ftp://ftp.openpkg.org/release/1.2/UPD/ - [9] http://www.openpkg.org/security.html#signature + [0] http://www.example.com/bugfinder.html + [1] http://www.foo.org/ + [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-... + [3] http://www.openpkg.org/tutorial.html#regular-source + [4] http://www.openpkg.org/tutorial.html#regular-binary + [5] http://www.openpkg.org/security.html#revoked + [6] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm + [7] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm + [8] ftp://ftp.openpkg.org/release/1.1/UPD/ + [9] ftp://ftp.openpkg.org/release/1.2/UPD/ + [10] http://www.openpkg.org/security.html#signature ________________________________________________________________________ For security reasons, this advisory was digitally signed with the @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]