[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2005.008-bzip2.txt

2005-06-10 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   10-Jun-2005 22:42:09
  Branch: HEAD Handle: 2005061021420900

  Modified files:
openpkg-web/securityOpenPKG-SA-2005.008-bzip2.txt

  Log:
release OpenPKG Security Advisory 2005.008 (bzip2)

  Summary:
RevisionChanges Path
1.5 +10 -0  openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  
  $ cvs diff -u -r1.4 -r1.5 OpenPKG-SA-2005.008-bzip2.txt
  --- openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt10 Jun 2005 
18:26:54 -  1.4
  +++ openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt10 Jun 2005 
20:42:09 -  1.5
  @@ -1,3 +1,6 @@
  +-BEGIN PGP SIGNED MESSAGE-
  +Hash: SHA1
  +
   
   
   OpenPKG Security AdvisoryThe OpenPKG Project
  @@ -99,3 +102,10 @@
   for details on how to verify the integrity of this advisory.
   
   
  +-BEGIN PGP SIGNATURE-
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQFCqfsRgHWT4GPEy58RAlK8AJwJrHocGaqSJyF3B0K32CygMRevsQCfRCx6
  +Wk2ihwlYtsP5vSk5sIm9E6g=
  +=RvKk
  +-END PGP SIGNATURE-
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2005.008-bzip2.txt

2005-06-10 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   10-Jun-2005 20:26:54
  Branch: HEAD Handle: 2005061019265400

  Modified files:
openpkg-web/securityOpenPKG-SA-2005.008-bzip2.txt

  Log:
cosmetics again

  Summary:
RevisionChanges Path
1.4 +15 -14 openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  
  $ cvs diff -u -r1.3 -r1.4 OpenPKG-SA-2005.008-bzip2.txt
  --- openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt10 Jun 2005 
13:28:42 -  1.3
  +++ openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt10 Jun 2005 
18:26:54 -  1.4
  @@ -3,7 +3,7 @@
   OpenPKG Security AdvisoryThe OpenPKG Project
   http://www.openpkg.org/security.html  http://www.openpkg.org
   [EMAIL PROTECTED] [EMAIL PROTECTED]
  -OpenPKG-SA-2005.008 10-June-2005
  +OpenPKG-SA-2005.008  10-Jun-2005
   
   
   Package: bzip2
  @@ -28,24 +28,24 @@
perl-comp perl-mail php::with_bzip2
   
   Description:
  -  According to a BugTraq posting [0], Imran Ghory discovered a time of
  -  check time of use (TOCTOU) file mode vulnerability in the bzip2 data
  -  compressor [1]. Because bzip2(1) does not safely restore the mode of
  -  a file undergoing compression or decompression, a malicious user can
  -  potentially change the mode of any file belonging to the user running
  -  bzip2(1). The Common Vulnerabilities and Exposures (CVE) project
  -  assigned the identifier CAN-2005-0953 [2] to this problem.
  +  According to a BugTraq posting [0], Imran Ghory discovered a time
  +  of check time of use (TOCTOU) file mode vulnerability in the BZip2
  +  data compressor [1]. Because bzip2(1) does not safely restore the
  +  mode of a file undergoing compression or decompression, a malicious
  +  user can potentially change the mode of any file belonging to the
  +  user running bzip2(1). The Common Vulnerabilities and Exposures (CVE)
  +  project assigned the identifier CAN-2005-0953 [2] to this problem.
   
 In a unrelated case, a denial of service vulnerability was found
 in both the bzip2(1) program and its associated library libbz2(3).
  -  Specially crafted bzip2 archives lead to an infinite loop in the
  +  Specially crafted BZip2 archives lead to an infinite loop in the
 decompressor which results in an indefinitively large output file.
 This could be exploited to cause disk space exhaustion. The Common
 Vulnerabilities and Exposures (CVE) project assigned the identifier
 CAN-2005-1260 [3] to this problem.
   
  -  Because the openpkg bootstrap package embeds bzip2, it may be affected
  -  as well. Please refer to OpenPKG-SA-2005.010-openpkg for details [4].
  +  Because the OpenPKG bootstrap package embeds BZip2, it is affected as
  +  well. Please refer to OpenPKG-SA-2005.010-openpkg for details [4].
   
 Please check whether you are affected by running "/bin/openpkg
 rpm -q bzip2". If you have the "bzip2" package installed and its
  @@ -72,13 +72,14 @@
 # /bin/openpkg rpm -Fvh /RPM/PKG/bzip2-1.0.2-2.3.1.*.rpm
   
 We recommend that you rebuild and reinstall any dependent packages
  -  (see above) as well [5][6]. The openpkg build tool can be instrumental
  -  in consistently updating and securing the entire OpenPKG instance.
  +  (see above) as well [5][6]. The "openpkg build" tool can be
  +  instrumental in consistently updating and securing the entire OpenPKG
  +  instance.
   
   
   References:
 [0]  http://marc.theaimsgroup.com/?l=bugtraq&m=111229375217633
  -  [1]  http://sources.redhat.com/bzip2/
  +  [1]  http://www.bzip.org/
 [2]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0953
 [3]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1260
 [4]  http://www.openpkg.org/security/OpenPKG-SA-2005.010-openpkg.html
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2005.008-bzip2.txt

2005-06-10 Thread Michael Schloh
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael Schloh
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   10-Jun-2005 15:28:42
  Branch: HEAD Handle: 2005061014284200

  Modified files:
openpkg-web/securityOpenPKG-SA-2005.008-bzip2.txt

  Log:
replace text regarding the affected bootstrap package with a reference to
OpenPKG-SA-2005.010-openpkg, where it is treated separately

  Summary:
RevisionChanges Path
1.3 +19 -18 openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  
  $ cvs diff -u -r1.2 -r1.3 OpenPKG-SA-2005.008-bzip2.txt
  --- openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt8 Jun 2005 
12:40:47 -   1.2
  +++ openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt10 Jun 2005 
13:28:42 -  1.3
  @@ -3,22 +3,19 @@
   OpenPKG Security AdvisoryThe OpenPKG Project
   http://www.openpkg.org/security.html  http://www.openpkg.org
   [EMAIL PROTECTED] [EMAIL PROTECTED]
  -OpenPKG-SA-2005.008 08-June-2005
  +OpenPKG-SA-2005.008 10-June-2005
   
   
  -Package: bzip2, openpkg, analog
  +Package: bzip2
   Vulnerability:   arbitrary file mode modification, denial of service
   OpenPKG Specific:no
   
   Affected Releases:   Affected Packages:   Corrected Packages:
   OpenPKG CURRENT  <= bzip2-1.0.2-20050324  >= bzip2-1.0.3-20050506
  - <= openpkg-20050527-20050527 >= 
openpkg-20050606-20050606
<= analog-6.0-20041220   >= analog-6.0-20050608
   OpenPKG 2.3  <= bzip2-1.0.2-2.3.0 >= bzip2-1.0.2-2.3.1
  - <= openpkg-2.2.2-2.2.2   >= openpkg-2.2.3-2.2.3
<= analog-6.0-2.3.0  >= analog-6.0-2.3.1
   OpenPKG 2.2  <= bzip2-1.0.2-2.2.0 >= bzip2-1.0.2-2.2.1
  - <= openpkg-2.3.1-2.3.1   >= openpkg-2.3.2-2.3.2
   
   Affected Releases:   Dependent Packages:
   OpenPKG CURRENT  apache::with_mod_php_bzip2 bsdtar clamav gnupg
  @@ -47,17 +44,20 @@
 Vulnerabilities and Exposures (CVE) project assigned the identifier
 CAN-2005-1260 [3] to this problem.
   
  +  Because the openpkg bootstrap package embeds bzip2, it may be affected
  +  as well. Please refer to OpenPKG-SA-2005.010-openpkg for details [4].
  +
 Please check whether you are affected by running "/bin/openpkg
 rpm -q bzip2". If you have the "bzip2" package installed and its
 version is affected (see above), we recommend that you immediately
  -  upgrade it (see Solution) and any dependent packages as well [4][5].
  +  upgrade it (see Solution) and any dependent packages as well [5][6].
   
   Solution:
 Select the updated source RPM appropriate for your OpenPKG release
  -  [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror
  -  location, verify its integrity [10], build a corresponding binary
  -  RPM from it [4] and update your OpenPKG installation by applying the
  -  binary RPM [5]. For the most recent release OpenPKG 2.3, perform the
  +  [7][8], fetch it from the OpenPKG FTP service [9][10] or a mirror
  +  location, verify its integrity [11], build a corresponding binary
  +  RPM from it [5] and update your OpenPKG installation by applying the
  +  binary RPM [6]. For the most recent release OpenPKG 2.3, perform the
 following operations to permanently fix the security problem (for
 other releases adjust accordingly).
   
  @@ -72,7 +72,7 @@
 # /bin/openpkg rpm -Fvh /RPM/PKG/bzip2-1.0.2-2.3.1.*.rpm
   
 We recommend that you rebuild and reinstall any dependent packages
  -  (see above) as well [4][5]. The openpkg build tool can be instrumental
  +  (see above) as well [5][6]. The openpkg build tool can be instrumental
 in consistently updating and securing the entire OpenPKG instance.
   
   
  @@ -81,13 +81,14 @@
 [1]  http://sources.redhat.com/bzip2/
 [2]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0953
 [3]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1260
  -  [4]  http://www.openpkg.org/tutorial.html#regular-source
  -  [5]  http://www.openpkg.org/tutorial.html#regular-binary
  -  [6]  ftp://ftp.openpkg.org/release/2.3/UPD/bzip2-1.0.2-2.3

[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2005.008-bzip2.txt

2005-06-08 Thread Michael Schloh
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael Schloh
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   08-Jun-2005 14:40:47
  Branch: HEAD Handle: 2005060813404700

  Modified files:
openpkg-web/securityOpenPKG-SA-2005.008-bzip2.txt

  Log:
add analog-6.0 packages to affected OpenPKG package list (containing
embedded libbz2) and improve formatting

  Summary:
RevisionChanges Path
1.2 +10 -8  openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2005.008-bzip2.txt
  --- openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt6 Jun 2005 
19:13:53 -   1.1
  +++ openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt8 Jun 2005 
12:40:47 -   1.2
  @@ -3,26 +3,28 @@
   OpenPKG Security AdvisoryThe OpenPKG Project
   http://www.openpkg.org/security.html  http://www.openpkg.org
   [EMAIL PROTECTED] [EMAIL PROTECTED]
  -OpenPKG-SA-2005.008 06-June-2005
  +OpenPKG-SA-2005.008 08-June-2005
   
   
  -Package: bzip2
  +Package: bzip2, openpkg, analog
   Vulnerability:   arbitrary file mode modification, denial of service
   OpenPKG Specific:no
   
   Affected Releases:   Affected Packages:   Corrected Packages:
   OpenPKG CURRENT  <= bzip2-1.0.2-20050324  >= bzip2-1.0.3-20050506
<= openpkg-20050527-20050527 >= 
openpkg-20050606-20050606
  + <= analog-6.0-20041220   >= analog-6.0-20050608
   OpenPKG 2.3  <= bzip2-1.0.2-2.3.0 >= bzip2-1.0.2-2.3.1
<= openpkg-2.2.2-2.2.2   >= openpkg-2.2.3-2.2.3
  + <= analog-6.0-2.3.0  >= analog-6.0-2.3.1
   OpenPKG 2.2  <= bzip2-1.0.2-2.2.0 >= bzip2-1.0.2-2.2.1
<= openpkg-2.3.1-2.3.1   >= openpkg-2.3.2-2.3.2
   
   Affected Releases:   Dependent Packages:
   OpenPKG CURRENT  apache::with_mod_php_bzip2 bsdtar clamav gnupg
  - imagemagick libarchive perl-comp perl-mail
  - pgpdump php::with_bzip2 php5::with_bzip2
  - python::with_bzip2 r rzip
  + imagemagick libarchive perl-comp perl-mail pgpdump
  + php::with_bzip2 php5::with_bzip2 python::with_bzip2
  + r rzip
   OpenPKG 2.3  apache::with_mod_php_bzip2 clamav gnupg imagemagick
perl-comp perl-mail php::with_bzip2 php5::with_bzip2
   OpenPKG 2.2  apache::with_mod_php_bzip2 clamav imagemagick
  @@ -46,9 +48,9 @@
 CAN-2005-1260 [3] to this problem.
   
 Please check whether you are affected by running "/bin/openpkg
  -  rpm -q bzip2". If you have the "bzip2" package installed and its version
  -  is affected (see above), we recommend that you immediately upgrade it
  -  (see Solution) and any dependent packages as well [4][5].
  +  rpm -q bzip2". If you have the "bzip2" package installed and its
  +  version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution) and any dependent packages as well [4][5].
   
   Solution:
 Select the updated source RPM appropriate for your OpenPKG release
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2005.008-bzip2.txt

2005-06-06 Thread Michael Schloh
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael Schloh
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   06-Jun-2005 21:13:53
  Branch: HEAD Handle: 2005060620135300

  Added files:
openpkg-web/securityOpenPKG-SA-2005.008-bzip2.txt

  Log:
preliminary commit OpenPKG-SA-2005.008-bzip2 CAN-2005-0953 CAN-2005-1260,
place hold on SA due to complex nature of patch code in several dependent
packages as well as those with affected embedded bzip2 code

  Summary:
RevisionChanges Path
1.1 +97 -0  openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2005.008-bzip2.txt
  --- /dev/null 2005-06-06 21:13:53 +0200
  +++ OpenPKG-SA-2005.008-bzip2.txt 2005-06-06 21:13:53 +0200
  @@ -0,0 +1,97 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2005.008 06-June-2005
  +
  +
  +Package: bzip2
  +Vulnerability:   arbitrary file mode modification, denial of service
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:   Corrected Packages:
  +OpenPKG CURRENT  <= bzip2-1.0.2-20050324  >= bzip2-1.0.3-20050506
  + <= openpkg-20050527-20050527 >= 
openpkg-20050606-20050606
  +OpenPKG 2.3  <= bzip2-1.0.2-2.3.0 >= bzip2-1.0.2-2.3.1
  + <= openpkg-2.2.2-2.2.2   >= openpkg-2.2.3-2.2.3
  +OpenPKG 2.2  <= bzip2-1.0.2-2.2.0 >= bzip2-1.0.2-2.2.1
  + <= openpkg-2.3.1-2.3.1   >= openpkg-2.3.2-2.3.2
  +
  +Affected Releases:   Dependent Packages:
  +OpenPKG CURRENT  apache::with_mod_php_bzip2 bsdtar clamav gnupg
  + imagemagick libarchive perl-comp perl-mail
  + pgpdump php::with_bzip2 php5::with_bzip2
  + python::with_bzip2 r rzip
  +OpenPKG 2.3  apache::with_mod_php_bzip2 clamav gnupg imagemagick
  + perl-comp perl-mail php::with_bzip2 php5::with_bzip2
  +OpenPKG 2.2  apache::with_mod_php_bzip2 clamav imagemagick
  + perl-comp perl-mail php::with_bzip2
  +
  +Description:
  +  According to a BugTraq posting [0], Imran Ghory discovered a time of
  +  check time of use (TOCTOU) file mode vulnerability in the bzip2 data
  +  compressor [1]. Because bzip2(1) does not safely restore the mode of
  +  a file undergoing compression or decompression, a malicious user can
  +  potentially change the mode of any file belonging to the user running
  +  bzip2(1). The Common Vulnerabilities and Exposures (CVE) project
  +  assigned the identifier CAN-2005-0953 [2] to this problem.
  +
  +  In a unrelated case, a denial of service vulnerability was found
  +  in both the bzip2(1) program and its associated library libbz2(3).
  +  Specially crafted bzip2 archives lead to an infinite loop in the
  +  decompressor which results in an indefinitively large output file.
  +  This could be exploited to cause disk space exhaustion. The Common
  +  Vulnerabilities and Exposures (CVE) project assigned the identifier
  +  CAN-2005-1260 [3] to this problem.
  +
  +  Please check whether you are affected by running "/bin/openpkg
  +  rpm -q bzip2". If you have the "bzip2" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution) and any dependent packages as well [4][5].
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror
  +  location, verify its integrity [10], build a corresponding binary
  +  RPM from it [4] and update your OpenPKG installation by applying the
  +  binary RPM [5]. For the most recent release OpenPKG 2.3, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/2.3/UPD
  +  ftp> get bzip2-1.0.2-2.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/openpkg rpm -v --checksig bzip2-1.0.2-2.3.1.src.rpm
  +  $ /bin/openpkg rpm --rebuild bzip2-1.0.2-2.3.1.src.rpm
  +  $ su -