OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   01-Apr-2004 20:09:48
  Branch: HEAD                             Handle: 2004040119094800

  Modified files:
    openpkg-web/security    OpenPKG-SA-2004.008-squid.txt

  Log:
    cleanups and fixes

  Summary:
    Revision    Changes     Path
    1.2         +10 -18     openpkg-web/security/OpenPKG-SA-2004.008-squid.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.008-squid.txt
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2004.008-squid.txt
  --- openpkg-web/security/OpenPKG-SA-2004.008-squid.txt        1 Apr 2004 15:57:40 
-0000       1.1
  +++ openpkg-web/security/OpenPKG-SA-2004.008-squid.txt        1 Apr 2004 18:09:48 
-0000       1.2
  @@ -15,25 +15,20 @@
   OpenPKG 2.0          <= squid-2.5.4-2.0.0        >= squid-2.5.4-2.0.1
   OpenPKG 1.3          <= squid-2.5.3-1.3.0        >= squid-2.5.3-1.3.1
   
  -Affected Releases:   Dependent Packages:
  -OpenPKG CURRENT      calamaris
  -OpenPKG 2.0          calamaris
  -OpenPKG 1.3          calamaris
  +Dependent Packages:  none
   
   Description:
  -  According to security advisory from the squid developers [0]
  -  a vulnerability exists in the URL unescape logic of the Squid
  -  Web Proxy Cache [1]. This bug could allow an attacker to bypass
  -  certain access controls by inserting a NUL character into
  -  decoded URLs.
  -
  -  The Common Vulnerabilities and Exposures (CVE) project assigned
  -  the id CAN-2004-0189 [2] to the problem.
  +  According to a security advisory [0] from the vendor, a vulnerability
  +  exists in the URL unescaping logic of the Squid Web Proxy Cache
  +  [1]. This bug could allow an attacker to bypass certain access
  +  controls by inserting a NUL character into decoded URLs. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2004-0189 [2] to the problem.
   
     Please check whether you are affected by running "<prefix>/bin/rpm
     -q squid". If you have the "squid" package installed and its version
     is affected (see above), we recommend that you immediately upgrade
  -  it (see Solution) and any dependent packages (see above). [3][4]
  +  it (see Solution). [3][4]
   
   Solution:
     Select the updated source RPM appropriate for your OpenPKG release
  @@ -53,9 +48,6 @@
     $ <prefix>/bin/openpkg rpm --rebuild squid-2.5.4-2.0.1.src.rpm
     $ su -
     # <prefix>/bin/openpkg rpm -Fvh <prefix>/RPM/PKG/squid-2.5.4-2.0.1.*.rpm
  -
  -  Additionally, we recommend that you rebuild and reinstall
  -  all dependent packages (see above), if any, too. [3][4]
   ________________________________________________________________________
   
   References:
  @@ -64,8 +56,8 @@
     [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0189
     [3] http://www.openpkg.org/tutorial.html#regular-source
     [4] http://www.openpkg.org/tutorial.html#regular-binary
  -  [5] ftp://ftp.openpkg.org/release/1.3/UPD/foo-1.2.3-1.3.1.src.rpm
  -  [6] ftp://ftp.openpkg.org/release/2.0/UPD/foo-1.2.3-2.0.1.src.rpm
  +  [5] ftp://ftp.openpkg.org/release/1.3/UPD/squid-2.5.3-1.3.1.src.rpm
  +  [6] ftp://ftp.openpkg.org/release/2.0/UPD/squid-2.5.4-2.0.1.src.rpm
     [7] ftp://ftp.openpkg.org/release/1.3/UPD/
     [8] ftp://ftp.openpkg.org/release/2.0/UPD/
     [9] http://www.openpkg.org/security.html#signature
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to