OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 25-Nov-2003 14:54:18 Branch: HEAD Handle: 2003112513541800 Modified files: openpkg-web/security 00README OpenPKG-SA-2003.049-zebra.txt Log: final polishing and signing Summary: Revision Changes Path 1.14 +1 -1 openpkg-web/security/00README 1.2 +30 -20 openpkg-web/security/OpenPKG-SA-2003.049-zebra.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/00README ============================================================================ $ cvs diff -u -r1.13 -r1.14 00README --- openpkg-web/security/00README 25 Sep 2003 07:50:55 -0000 1.13 +++ openpkg-web/security/00README 25 Nov 2003 13:54:18 -0000 1.14 @@ -5,5 +5,5 @@ $ mutt [EMAIL PROTECTED] mutt [EMAIL PROTECTED] mutt [EMAIL PROTECTED] - Subject: [OpenPKG-SA-2003.043] OpenPKG Security Advisory (proftpd) + Subject: [OpenPKG-SA-2003.048] OpenPKG Security Advisory (postgresql) @@ . patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2003.049-zebra.txt ============================================================================ $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.049-zebra.txt --- openpkg-web/security/OpenPKG-SA-2003.049-zebra.txt 25 Nov 2003 13:38:00 -0000 1.1 +++ openpkg-web/security/OpenPKG-SA-2003.049-zebra.txt 25 Nov 2003 13:54:18 -0000 1.2 @@ -1,3 +1,6 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project @@ -11,21 +14,21 @@ OpenPKG Specific: no Affected Releases: Affected Packages: Corrected Packages: -OpenPKG CURRENT <= zebra-0.93b-20031001 >= zebra-0.93b-20031113 -OpenPKG 1.3 <= zebra-0.93b-1.3.0 >= zebra-0.93b-1.3.1 -OpenPKG 1.2 <= zebra-0.93b-1.2.0 >= zebra-0.93b-1.2.1 +OpenPKG CURRENT <= zebra-0.93b-20031001 >= zebra-0.93b-20031113 +OpenPKG 1.3 <= zebra-0.93b-1.3.0 >= zebra-0.93b-1.3.1 +OpenPKG 1.2 <= zebra-0.93b-1.2.0 >= zebra-0.93b-1.2.1 Dependent Packages: none Description: - Jonny Robertson reported that Zebra can be remotely crashed if a - remote attacker can connect to the Zebra telnet management port [0]. - The Common Vulnerabilities and Exposures (CVE) project assigned the id + Jonny Robertson reported [0] that Zebra can be remotely crashed if a + remote attacker can connect to the Zebra telnet management ports. The + Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2003-0795 [1] to the problem. - Herbert Xu reported that Zebra can accept spoofed messages sent on the - kernel netlink interface by other users on the local machine [2]. The - Common Vulnerabilities and Exposures (CVE) project assigned the id + Herbert Xu reported [2] that Zebra can accept spoofed messages sent + on the kernel netlink interface by other users on the local machine. + The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2003-0858 [3] to the problem. Please check whether you are affected by running "<prefix>/bin/rpm -q @@ -54,17 +57,17 @@ ________________________________________________________________________ References: - [0] http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=107140 - [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 - [2] http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=108571 - [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0858 - [4] http://www.openpkg.org/tutorial.html#regular-source - [5] http://www.openpkg.org/tutorial.html#regular-binary - [6] ftp://ftp.openpkg.org/release/1.2/UPD/zebra-0.93b-1.3.1.src.rpm - [7] ftp://ftp.openpkg.org/release/1.3/UPD/zebra-0.93b-1.2.1.src.rpm - [8] ftp://ftp.openpkg.org/release/1.2/UPD/ - [9] ftp://ftp.openpkg.org/release/1.3/UPD/ - [10] http://www.openpkg.org/security.html#signature + [0] http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=107140 + [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 + [2] http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=108571 + [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0858 + [4] http://www.openpkg.org/tutorial.html#regular-source + [5] http://www.openpkg.org/tutorial.html#regular-binary + [6] ftp://ftp.openpkg.org/release/1.2/UPD/zebra-0.93b-1.2.1.src.rpm + [7] ftp://ftp.openpkg.org/release/1.3/UPD/zebra-0.93b-1.3.1.src.rpm + [8] ftp://ftp.openpkg.org/release/1.2/UPD/ + [9] ftp://ftp.openpkg.org/release/1.3/UPD/ + [10] http://www.openpkg.org/security.html#signature ________________________________________________________________________ For security reasons, this advisory was digitally signed with the @@ -74,3 +77,10 @@ for details on how to verify the integrity of this advisory. ________________________________________________________________________ +-----BEGIN PGP SIGNATURE----- +Comment: OpenPKG <[EMAIL PROTECTED]> + +iD8DBQE/w17bgHWT4GPEy58RArU6AKC9fZylkM+kJnqfANvAjE8xdmUv8QCg7P7C +gNbfNm/Qb8T/EAoGPLzpGUo= +=D/VD +-----END PGP SIGNATURE----- @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]