[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-04-07 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   07-Apr-2004 14:45:54
  Branch: HEAD Handle: 2004040713455301

  Added files:
openpkg-web/securityOpenPKG-SA-2004.011-sharutils
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2004.011-sharutils

  Summary:
RevisionChanges Path
1.69+1  -0  openpkg-web/security.txt
1.89+1  -0  openpkg-web/security.wml
1.1 +75 -0  openpkg-web/security/OpenPKG-SA-2004.011-sharutils
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.68 -r1.69 security.txt
  --- openpkg-web/security.txt  5 Apr 2004 12:48:29 -   1.68
  +++ openpkg-web/security.txt  7 Apr 2004 12:45:53 -   1.69
  @@ -1,3 +1,4 @@
  +07-Apr-2004: Security Advisory: S
   05-Apr-2004: Security Advisory: S
   01-Apr-2004: Security Advisory: S
   18-Mar-2004: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.88 -r1.89 security.wml
  --- openpkg-web/security.wml  5 Apr 2004 12:56:08 -   1.88
  +++ openpkg-web/security.wml  7 Apr 2004 12:45:54 -   1.89
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.011-sharutils
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.011-sharutils
  --- /dev/null 2004-04-07 14:45:54.0 +0200
  +++ OpenPKG-SA-2004.011-sharutils 2004-04-07 14:45:54.0 +0200
  @@ -0,0 +1,75 @@
  +#FIXME, this is a template
  +#FIXME, the first three lines are just dummies
  +#FIXME, to help comparing this against sibling signed documents
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.011  07-Apr-2004
  +
  +
  +Package: sharutils
  +Vulnerability:   arbitrary code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= sharutils-4.2.1-20011201 >= sharutils-4.2.1-20040407
  +OpenPKG 2.0  <= sharutils-4.2.1-2.0.0>= sharutils-4.2.1-2.0.1
  +OpenPKG 1.3  <= sharutils-4.2.1-1.3.0>= sharutils-4.2.1-1.3.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a posting on Bugtraq [1], Shaun Colley discovered and
  +  researched a stack-based buffer overflow vulnerability which exists in
  +  the GNU Sharutils [2] due to lack of bounds checking when handling the
  +  '-o' command-line option.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q sharutils". If you have the "sharutils" package installed and its
  +  version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the most recent release OpenPKG 2.0, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/2.0/UPD
  +  ftp> get sharutils-4.2.1-2.0.1.src.rpm
  +  ftp> bye
  +  $ /bin/openpkg rpm -v --checksig sharutils-4.2.1-2.0.1.src.rpm
  +  $ /bin/openpkg rpm --rebuild sharutils-4.2.1-2.0.1.src.rpm
  +  $ su -
  +  # /bin/openpkg rpm -Fvh /RPM/PKG/sharutils-4.2.1-2.0.1.*.rpm
  +
  +  Additionally, we recommend that you rebuild and reinstall
  +  all dependent packages (see above), if any, too. [3][4]
  +
  +
  +References:
  +  [1] http://www.securityfocus.com/archive/1/359639
  +  [2] http://www.gnu.org/software/sharutils/
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://f

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-04-05 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   05-Apr-2004 14:48:30
  Branch: HEAD Handle: 2004040513482901

  Added files:
openpkg-web/securityOpenPKG-SA-2004.009-mc
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2004.009-mc; CAN-2003-1023

  Summary:
RevisionChanges Path
1.68+1  -0  openpkg-web/security.txt
1.87+1  -0  openpkg-web/security.wml
1.1 +78 -0  openpkg-web/security/OpenPKG-SA-2004.009-mc
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.67 -r1.68 security.txt
  --- openpkg-web/security.txt  1 Apr 2004 21:01:13 -   1.67
  +++ openpkg-web/security.txt  5 Apr 2004 12:48:29 -   1.68
  @@ -1,3 +1,4 @@
  +05-Apr-2004: Security Advisory: S
   01-Apr-2004: Security Advisory: S
   18-Mar-2004: Security Advisory: S
   12-Mar-2004: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.86 -r1.87 security.wml
  --- openpkg-web/security.wml  1 Apr 2004 21:01:13 -   1.86
  +++ openpkg-web/security.wml  5 Apr 2004 12:48:29 -   1.87
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.009-mc
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.009-mc
  --- /dev/null 2004-04-05 14:48:30.0 +0200
  +++ OpenPKG-SA-2004.009-mc2004-04-05 14:48:30.0 +0200
  @@ -0,0 +1,78 @@
  +-BEGIN PGP SIGNED MESSAGE-#FIXME, this is a template
  +Hash: SHA1#FIXME, this is a template
  +  #FIXME, this is a template
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.009  05-Apr-2004
  +
  +
  +Package: mc
  +Vulnerability:   buffer overflow
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= mc-4.6.0-20040207>= mc-4.6.0-20040405
  +OpenPKG 2.0  <= mc-4.6.0-2.0.0   >= mc-4.6.0-2.0.1
  +OpenPKG 1.3  <= mc-4.6.0-1.3.0   >= mc-4.6.0-1.3.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a message from Ilya Teterin posted on Bugtraq [0] the
  +  Midnight Commander application [1] is using uninitialized buffer for
  +  handling symlinks in VFS. This allows attackers to execute arbitrary
  +  code during symlink conversion. The Common Vulnerabilities and
  +  Exposures (CVE) project assigned the id CAN-2003-1023 [2] to the
  +  problem.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q mc". If you have the "mc" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the most recent release OpenPKG 2.0, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/2.0/UPD
  +  ftp> get mc-4.6.0-2.0.1.src.rpm
  +  ftp> bye
  +  $ /bin/openpkg rpm -v --checksig mc-4.6.0-2.0.1.src.rpm
  +  $ /bin/openpkg rpm --rebuild mc-4.6.0-2.0.1.src.rpm
  +  $ su -
  +  # /bin/openpkg rpm -Fvh /RPM/PKG/mc-4.6.0-2.0.1.*.rpm
  +
  +  Additionally, we recommend that you rebuild and reinstall
  +  all dependent packages (see above), if any, too. [3][4]
  +
  +
  +References:
  +  [0] http://marc.theaimsgroup.com/?l=bugtraq&m=106399528518704
  +  [1] http://www.ibiblio.org/mc/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.c

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-03-18 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   18-Mar-2004 11:02:39
  Branch: HEAD Handle: 2004031810023800

  Added files:
openpkg-web/securityOpenPKG-SA-2004.007-openssl.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2004.007-openssl; CAN-2004-0079, CAN-2004-0112

  Summary:
RevisionChanges Path
1.66+1  -0  openpkg-web/security.txt
1.85+1  -0  openpkg-web/security.wml
1.1 +111 -0 openpkg-web/security/OpenPKG-SA-2004.007-openssl.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.65 -r1.66 security.txt
  --- openpkg-web/security.txt  12 Mar 2004 14:45:10 -  1.65
  +++ openpkg-web/security.txt  18 Mar 2004 10:02:38 -  1.66
  @@ -1,3 +1,4 @@
  +18-Mar-2004: Security Advisory: S
   12-Mar-2004: Security Advisory: S
   09-Mar-2004: Security Advisory: S
   08-Mar-2004: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.84 -r1.85 security.wml
  --- openpkg-web/security.wml  12 Mar 2004 14:45:10 -  1.84
  +++ openpkg-web/security.wml  18 Mar 2004 10:02:38 -  1.85
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.007-openssl.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.007-openssl.txt
  --- /dev/null 2004-03-18 11:02:39.0 +0100
  +++ OpenPKG-SA-2004.007-openssl.txt   2004-03-18 11:02:39.0 +0100
  @@ -0,0 +1,111 @@
  +-BEGIN PGP SIGNED MESSAGE-#FIXME, this is a template
  +Hash: SHA1#FIXME, this is a template
  +  #FIXME, this is a template
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.007  18-Mar-2004
  +
  +
  +Package: openssl
  +Vulnerability:   denial of service
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= openssl-0.9.7c-20040207  >= openssl-0.9.7d-20040318
  +OpenPKG 2.0  <= openssl-0.9.7c-2.0.0 >= openssl-0.9.7c-2.0.1
  +OpenPKG 1.3  <= openssl-0.9.7b-1.3.2 >= openssl-0.9.7b-1.3.3
  +
  +Affected Releases:   Dependent Packages:
  +
  +OpenPKG CURRENT  same as OpenPKG 2.0 FIXME this list needs review
  +
  +OpenPKG 2.0  apache* bind blender cadaver cfengine cpu cups curl
  + distcache dsniff easysoap ethereal* exim fetchmail
  + imap imapd imaputils inn jabberd kde-base kde-libs
  + linc links lynx mailsync meta-core mico* mixmaster
  + monit* mozilla mutt mutt15 nail neon nessus-libs
  + nmap openldap openssh openvpn perl-ssl pgadmin php*
  + pine* postfix* postgresql pound proftpd* qpopper
  + rdesktop samba samba3 sasl scanssh sendmail* siege
  + sio* sitecopy snmp socat squid* stunnel subversion
  + suck sysmon tcpdump tinyca w3m wget xmlsec
  +
  +OpenPKG 1.3  apache* bind cfengine cpu curl ethereal* fetchmail
  + imap imapd inn links lynx mico* mutt nail neon
  + openldap openssh perl-ssl php* postfix* postgresql
  + proftpd* qpopper rdesktop samba sasl scanssh
  + sendmail* siege sio* sitecopy snmp socat squid*
  + stunnel suck sysmon tcpdump tinyca w3m wget xmlsec
  +
  + (*) marked packages are only affected if certain build
  + options ("with_xxx") were used at build time. See
  + Appendix below for details.
  +
  +Description:
  +  According to an OpenSSL [0] security advisory [1], denial of service
  +  vulnerabilities exist in OpenSSL versions 0.9.6c to 0.9.6l inclusive
  +  and versions 0.9.7a to 0.9.7c inclusive.
  +
  +  Testing perf

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-03-12 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   12-Mar-2004 15:45:11
  Branch: HEAD Handle: 2004031214451000

  Added files:
openpkg-web/securityOpenPKG-SA-2004.006-uudeview.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2004.006-uudeview

  Summary:
RevisionChanges Path
1.65+2  -1  openpkg-web/security.txt
1.84+1  -0  openpkg-web/security.wml
1.1 +75 -0  openpkg-web/security/OpenPKG-SA-2004.006-uudeview.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.64 -r1.65 security.txt
  --- openpkg-web/security.txt  9 Mar 2004 14:43:35 -   1.64
  +++ openpkg-web/security.txt  12 Mar 2004 14:45:10 -  1.65
  @@ -1,4 +1,5 @@
  -09-Mar-2004: Security Advisory: S
  +12-Mar-2004: Security Advisory: S
  +09-Mar-2004: Security Advisory: S
   08-Mar-2004: Security Advisory: S
   05-Mar-2004: Security Advisory: S
   16-Jan-2004: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.83 -r1.84 security.wml
  --- openpkg-web/security.wml  9 Mar 2004 14:43:35 -   1.83
  +++ openpkg-web/security.wml  12 Mar 2004 14:45:10 -  1.84
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.006-uudeview.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.006-uudeview.txt
  --- /dev/null 2004-03-12 15:45:11.0 +0100
  +++ OpenPKG-SA-2004.006-uudeview.txt  2004-03-12 15:45:11.0 +0100
  @@ -0,0 +1,75 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.006  12-Mar-2004
  +
  +
  +Package: uudeview
  +Vulnerability:   insecure temp file handling, buffer overflow
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= uudeview-0.5.20-20040302 >= uudeview-0.5.20-20040312
  +OpenPKG 2.0  <= uudeview-0.5.19-2.0.0>= uudeview-0.5.19-2.0.1
  +OpenPKG 1.3  <= uudeview-0.5.18-1.3.0>= uudeview-0.5.18-1.3.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  Alerted by a posting on Bugtraq [1] the uudeview [2] package was
  +  reviewed. It was found that 0.5.19 and later contain a bug which
  +  leads to failure retrieving the filename during decode. All versions
  +  suffered from insecure temp file handling. Version 0.5.20 contains bug
  +  fixes for the parsing of header lines, exact handling of maximum line
  +  length and fixes for two buffer overflows which needed backporting.
  +  The corected packages listed above remedy all of these problems.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q uudeview". If you have the "uudeview" package installed and its
  +  version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the most recent release OpenPKG 2.0, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/2.0/UPD
  +  ftp> get uudeview-0.5.19-2.0.1.src.rpm
  +  ftp> bye
  +  $ /bin/openpkg rpm -v --checksig uudeview-0.5.19-2.0.1.src.rpm
  +  $ /bin/openpkg rpm --rebuild uudeview-0.5.19-2.0.1.src.rpm
  +  $ su -
  +  # /bin/openpkg rpm -Fvh /RPM/PKG/uudeview-0.5.19-2.0.1.*.rpm
  +
  +  Additionally, we recommend that you rebuild and reinstall
  +  all dependent packages (see above), if any, too. [3][4]
  +
  +
  +References:
  +  [1] http://marc.theaimsgroup

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-03-09 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   09-Mar-2004 15:43:36
  Branch: HEAD Handle: 2004030914433501

  Added files:
openpkg-web/securityOpenPKG-SA-2004.005-mutt.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2004.005-mutt; CAN-2004-0078

  Summary:
RevisionChanges Path
1.64+1  -0  openpkg-web/security.txt
1.83+1  -0  openpkg-web/security.wml
1.1 +73 -0  openpkg-web/security/OpenPKG-SA-2004.005-mutt.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.63 -r1.64 security.txt
  --- openpkg-web/security.txt  8 Mar 2004 14:09:51 -   1.63
  +++ openpkg-web/security.txt  9 Mar 2004 14:43:35 -   1.64
  @@ -1,3 +1,4 @@
  +09-Mar-2004: Security Advisory: S
   08-Mar-2004: Security Advisory: S
   05-Mar-2004: Security Advisory: S
   16-Jan-2004: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.82 -r1.83 security.wml
  --- openpkg-web/security.wml  8 Mar 2004 14:09:51 -   1.82
  +++ openpkg-web/security.wml  9 Mar 2004 14:43:35 -   1.83
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.005-mutt.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.005-mutt.txt
  --- /dev/null 2004-03-09 15:43:36.0 +0100
  +++ OpenPKG-SA-2004.005-mutt.txt  2004-03-09 15:43:36.0 +0100
  @@ -0,0 +1,73 @@
  +
  +
  +
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.005  09-Mar-2004
  +
  +
  +Package: mutt
  +Vulnerability:   buffer overflow in the index menu code
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= mutt-1.4.1i-20040207 >= mutt-1.4.2.1i-20040214
  +OpenPKG 2.0  noneN.A.
  +OpenPKG 1.3  <= mutt-1.4.1i-1.3.1>= mutt-1.4.1i-1.3.2
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a posting on Bugtraq [0], a buffer overflow exists in the
  +  mail user agent Mutt [1]. It be triggered by incoming messages and
  +  there are reports about spam that has actually triggered this problem
  +  and crashed mutt. The bug was reported to Red Hat by Niels Heinen. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2004-0078 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  mutt". If you have the "mutt" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5], fetch it from the OpenPKG FTP service [6] or a mirror location,
  +  verify its integrity [7], build a corresponding binary RPM from it [3]
  +  and update your OpenPKG installation by applying the binary RPM [4].
  +  For the affected release OpenPKG 1.3, perform the following operations
  +  to permanently fix the security problem (for other releases adjust
  +  accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get mutt-1.4.1i-1.3.2.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig mutt-1.4.1i-1.3.2.src.rpm
  +  $ /bin/rpm --rebuild mutt-1.4.1i-1.3.2.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/mutt-1.4.1i-1.3.2.*.rpm
  +
  +
  +References:
  +  [0] http://marc.theaimsgroup.com/?l=bugtraq&m=107651677817933
  +  [1] http://www.mutt.org/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0078
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.3/UPD/foo-1.2.3-1.3.1.src.rpm
  +  [6] ftp://ftp.openpkg.org/release/1.3/UPD/
  +  [7] htt

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-03-08 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   08-Mar-2004 15:09:52
  Branch: HEAD Handle: 2004030814095100

  Added files:
openpkg-web/securityOpenPKG-SA-2004.004-libtool.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
OpenPKG-SA-2004.004-libtool

  Summary:
RevisionChanges Path
1.63+1  -0  openpkg-web/security.txt
1.82+1  -0  openpkg-web/security.wml
1.1 +82 -0  openpkg-web/security/OpenPKG-SA-2004.004-libtool.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.62 -r1.63 security.txt
  --- openpkg-web/security.txt  5 Mar 2004 16:07:14 -   1.62
  +++ openpkg-web/security.txt  8 Mar 2004 14:09:51 -   1.63
  @@ -1,3 +1,4 @@
  +08-Mar-2004: Security Advisory: S
   05-Mar-2004: Security Advisory: S
   16-Jan-2004: Security Advisory: S
   08-Jan-2004: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.81 -r1.82 security.wml
  --- openpkg-web/security.wml  5 Mar 2004 16:07:14 -   1.81
  +++ openpkg-web/security.wml  8 Mar 2004 14:09:51 -   1.82
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.004-libtool.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.004-libtool.txt
  --- /dev/null 2004-03-08 15:09:52.0 +0100
  +++ OpenPKG-SA-2004.004-libtool.txt   2004-03-08 15:09:52.0 +0100
  @@ -0,0 +1,82 @@
  +
  +
  +
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.004  08-Mar-2004
  +
  +
  +Package: libtool
  +Vulnerability:   insecure creation of temporary directory
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= libtool-1.5.2-20040207   >= libtool-1.5.2-20040308   
  +OpenPKG 2.0  <= libtool-1.5.2-2.0.0  >= libtool-1.5.2-2.0.1  
  +OpenPKG 1.3  <= libtool-1.5-1.3.0>= libtool-1.5-1.3.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a posting on Bugtraq [0], a issue regarding the insecure
  +  creation of a temporary directory issue exists in libtool [1] versions
  +  before 1.5.2. Use of mkdir(1) along with -p option makes libtool
  +  vulnerable to symlink attacks. Stefan Nordhausen commited a fix that
  +  removes use of the -p option in 1.5.2. Discussion on Bugtraq further
  +  indicates that a additional race condition issue exists in the same
  +  context using chmod(1) which was reported by Joseph S. Myers back in
  +  March 2000 [2]. The updated OpenPKG versions of libtool contain fixes
  +  for both issues.
  +  
  +  Please check whether you are affected by running "/bin/rpm
  +  -q libtool". If you have the "libtool" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade
  +  it (see Solution) and it's dependent packages (see above), if any,
  +  too. [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 2.0, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/2.0/UPD
  +  ftp> get libtool-1.5.2-2.0.1.src.rpm
  +  ftp> bye
  +  $ /bin/openpkg rpm -v --checksig libtool-1.5.2-2.0.1.src.rpm
  +  $ /bin/openpkg rpm --rebuild libtool-1.5.2-2.0.1.src.rpm
  +  $ su -
  +  # /bin/openpkg rpm -Fvh /RPM/PKG/libtool-1.5.2-2.0.1.*.rpm
  +
  +  Additionally, we recommend that you rebuild and reinstall
  +  all dependent packages (see above), if any, too. [3][4]
  +_

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-01-16 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   16-Jan-2004 13:43:45
  Branch: HEAD Handle: 2004011612434400

  Added files:
openpkg-web/securityOpenPKG-SA-2004.002-tcpdump.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2004.002-tcpdump; CAN-2002-0380, CAN-2002-1350, CAN-2003-0108,
CAN-2003-0989, CAN-2003-1029, CAN-2004-0055, CAN-2004-0057

  Summary:
RevisionChanges Path
1.61+1  -0  openpkg-web/security.txt
1.78+1  -0  openpkg-web/security.wml
1.1 +97 -0  openpkg-web/security/OpenPKG-SA-2004.002-tcpdump.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.60 -r1.61 security.txt
  --- openpkg-web/security.txt  8 Jan 2004 08:03:57 -   1.60
  +++ openpkg-web/security.txt  16 Jan 2004 12:43:44 -  1.61
  @@ -1,3 +1,4 @@
  +16-Jan-2004: Security Advisory: S
   08-Jan-2004: Security Advisory: S
   17-Dec-2003: Security Advisory: S
   17-Dec-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.77 -r1.78 security.wml
  --- openpkg-web/security.wml  8 Jan 2004 08:03:57 -   1.77
  +++ openpkg-web/security.wml  16 Jan 2004 12:43:44 -  1.78
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.002-tcpdump.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.002-tcpdump.txt
  --- /dev/null 2004-01-16 13:43:45.0 +0100
  +++ OpenPKG-SA-2004.002-tcpdump.txt   2004-01-16 13:43:45.0 +0100
  @@ -0,0 +1,97 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.002  16-Jan-2004
  +
  +
  +Package: tcpdump
  +Vulnerability:   denial of service
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= tcpdump-3.8.1-20040108   >= tcpdump-3.8.1-20040116
  +OpenPKG 1.3  <= tcpdump-3.7.2-1.3.0  >= tcpdump-3.7.2-1.3.1
  +OpenPKG 1.2  <= tcpdump-3.7.1-1.2.1  >= tcpdump-3.7.1-1.2.2
  +
  +Dependent Packages:  none
  +
  +Description:
  +  A bunch of vulnerabilities in tcpdump [0] were found and addressed
  +  in the past. All of them are in the area of packet decoding. Faulty
  +  decoder functions can result in denial of service attacks through
  +  infinite loops, memory starvation and application crashes. In the
  +  worst case arbitrary code execution is possible.
  +
  +  This OpenPKG update resolves all issues currently known, as shown in
  +  the following table:
  +
  +  tcpdump   371 371 372 381
  +  OpenPKG   120 121 130 20020822
  +--- --- --- ---
  +  CAN-2002-0380 [2] nfs  y   n   n   n   see past OpenPKG-SA [1]
  +  CAN-2002-1350 [3] bgp  y   n   n   n   see past OpenPKG-SA [1]
  +  CAN-2003-0108 [4] isakmp   y   n   n   n   see past OpenPKG-SA [1]
  +depthy   y   y   n   (*)
  +  CAN-2003-0989 [5] isakmp   y   y   y   n   updates CAN-2003-0108-isakmp
  +  CAN-2003-1029 [6] l2tp y   y   n   n
  +  CAN-2004-0055 [7] radius   y   y   y   y
  +  CAN-2004-0057 [8] isakmp   y   y   y   y
  +
  +  (*) the vendor code fix for CAN-2003-0108 had two other unrelated code
  +  changes piggybacked. We removed the cosmetics (constify) and
  +  extracted an enhancement (depth).
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  tcpdump". If you have the "tcpdump" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution) and it's dependent packages (see above), if any, too.
  +  [9][10]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [11][12], fetch it from the OpenPKG FTP service [13][14] or a mirror
  +  location, verify its integrity [15], build a corresponding binary RPM
  +  from it [9] and update your 

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-01-08 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   08-Jan-2004 09:03:58
  Branch: HEAD Handle: 2004010808035701

  Added files:
openpkg-web/securityOpenPKG-SA-2004.001-inn.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2004.001-inn

  Summary:
RevisionChanges Path
1.60+1  -0  openpkg-web/security.txt
1.77+1  -0  openpkg-web/security.wml
1.1 +69 -0  openpkg-web/security/OpenPKG-SA-2004.001-inn.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.59 -r1.60 security.txt
  --- openpkg-web/security.txt  17 Dec 2003 11:59:23 -  1.59
  +++ openpkg-web/security.txt  8 Jan 2004 08:03:57 -   1.60
  @@ -1,3 +1,4 @@
  +08-Jan-2004: Security Advisory: S
   17-Dec-2003: Security Advisory: S
   17-Dec-2003: Security Advisory: S
   04-Dec-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.76 -r1.77 security.wml
  --- openpkg-web/security.wml  17 Dec 2003 11:59:24 -  1.76
  +++ openpkg-web/security.wml  8 Jan 2004 08:03:57 -   1.77
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.001-inn.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.001-inn.txt
  --- /dev/null 2004-01-08 09:03:58.0 +0100
  +++ OpenPKG-SA-2004.001-inn.txt   2004-01-08 09:03:58.0 +0100
  @@ -0,0 +1,69 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.001  08-Jan-2004
  +
  +
  +Package: inn
  +Vulnerability:   remotely exploitable access to inn user
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= inn-2.4.0-2003   >= inn-2.4.0-20040108
  +OpenPKG 1.3  <= inn-2.4.0-1.3.0  >= inn-2.4.0-1.3.1
  +OpenPKG 1.2  noneN.A.
  +
  +Description:
  +  According to a posting from Russ Allbery on the inn announce mailing
  +  list, Dan Riley discovered a buffer overflow in a portion of the
  +  control message handling code introduced in INN 2.4.0. It is fairly
  +  likely that this overflow could be remotely exploited to gain access
  +  to the user innd runs as. INN 2.3.x and earlier are not affected.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q inn". If you have the "inn" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade
  +  it (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][5], fetch it from the OpenPKG FTP service [7][6] or a mirror
  +  location, verify its integrity [7], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.3, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get inn-2.4.0-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig inn-2.4.0-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild inn-2.4.0-1.3.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/inn-2.4.0-1.3.1.*.rpm
  +
  +  Additionally, we recommend that you rebuild and reinstall
  +  all dependent packages (see above), if any, too. [3][4]
  +
  +
  +References:
  +  [1] http://www.isc.org/products/INN/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-...
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.3/UPD/inn-2.4.0-1.3.1.src.rpm
  +  [6] ftp://ftp.openpkg.org/release/1.3/UPD/
  +  [7] http://www.openpkg.org/security.html#signature
  +__

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-12-04 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   04-Dec-2003 16:21:13
  Branch: HEAD Handle: 2003120415211201

  Added files:
openpkg-web/securityOpenPKG-SA-2003.051-rsync.txt
  Modified files:
openpkg-web security.txt security.wml
openpkg-web/securitypage.pl

  Log:
SA-2003.051-rsync; CAN-2003-0962

  Summary:
RevisionChanges Path
1.58+1  -0  openpkg-web/security.txt
1.75+1  -0  openpkg-web/security.wml
1.1 +80 -0  openpkg-web/security/OpenPKG-SA-2003.051-rsync.txt
1.34+1  -1  openpkg-web/security/page.pl
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.57 -r1.58 security.txt
  --- openpkg-web/security.txt  28 Nov 2003 11:21:06 -  1.57
  +++ openpkg-web/security.txt  4 Dec 2003 15:21:12 -   1.58
  @@ -1,3 +1,4 @@
  +04-Dec-2003: Security Advisory: S
   28-Nov-2003: Security Advisory: S
   25-Nov-2003: Security Advisory: S
   11-Nov-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.74 -r1.75 security.wml
  --- openpkg-web/security.wml  28 Nov 2003 11:21:06 -  1.74
  +++ openpkg-web/security.wml  4 Dec 2003 15:21:12 -   1.75
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.051-rsync.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.051-rsync.txt
  --- /dev/null 2003-12-04 16:21:13.0 +0100
  +++ OpenPKG-SA-2003.051-rsync.txt 2003-12-04 16:21:13.0 +0100
  @@ -0,0 +1,80 @@
  + 
  +
  +
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.051  04-Dec-2003
  +
  +
  +Package: rsync
  +Vulnerability:   arbitrary code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= rsync-2.5.6-20030807 >= rsync-2.5.7-20031204
  +OpenPKG 1.3  <= rsync-2.5.6-1.3.0>= rsync-2.5.6-1.3.1
  +OpenPKG 1.2  <= rsync-2.5.5-1.2.0>= rsync-2.5.5-1.2.1
  +
  +Dependent Packages:  none FIXME check meta-core and rdiff-backup
  +
  +Description:
  +  According to a rsync security advisory [0], a heap overflow
  +  vulnerability exists in rsync [1] version 2.5.6 and earlier when used
  +  as a rsync server which typically listens on TCP port 873. An exploit
  +  is known to be in the wild and the security of a public rsync was
  +  compromised. A successful attack does not directly lead to root access
  +  but can be combined with other local exploits. The do_brk vulnerbility
  +  in Linux kernels prior 2.4.23 is worthwhile to mention these days. The
  +  attack is known to be considerably easier when the "use chroot = no"
  +  option is set in rsync.conf which is not the default in OpenPKG. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0962 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  rsync". If you have the "rsync" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.3, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get rsync-2.5.6-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig rsync-2.5.6-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild rsync-2.5.6-1.3.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/rsync-2.5.6-1.3.1.*.rpm
  +__

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-11-28 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   28-Nov-2003 12:21:07
  Branch: HEAD Handle: 2003112811210600

  Added files:
openpkg-web/securityOpenPKG-SA-2003.050-screen.txt
  Modified files:
openpkg-web security.txt security.wml
openpkg-web/securitypage.pl

  Log:
SA-2003.050-screen

  Summary:
RevisionChanges Path
1.57+1  -0  openpkg-web/security.txt
1.74+1  -0  openpkg-web/security.wml
1.1 +71 -0  openpkg-web/security/OpenPKG-SA-2003.050-screen.txt
1.33+1  -1  openpkg-web/security/page.pl
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.56 -r1.57 security.txt
  --- openpkg-web/security.txt  25 Nov 2003 13:37:59 -  1.56
  +++ openpkg-web/security.txt  28 Nov 2003 11:21:06 -  1.57
  @@ -1,3 +1,4 @@
  +28-Nov-2003: Security Advisory: S
   25-Nov-2003: Security Advisory: S
   11-Nov-2003: Security Advisory: S
   30-Oct-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.73 -r1.74 security.wml
  --- openpkg-web/security.wml  25 Nov 2003 13:37:59 -  1.73
  +++ openpkg-web/security.wml  28 Nov 2003 11:21:06 -  1.74
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.050-screen.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.050-screen.txt
  --- /dev/null 2003-11-28 12:21:07.0 +0100
  +++ OpenPKG-SA-2003.050-screen.txt2003-11-28 12:21:07.0 +0100
  @@ -0,0 +1,71 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.050  28-Nov-2003
  +
  +
  +Package: screen
  +Vulnerability:   privilege escalation
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= screen-4.0.1-20031009>= screen-4.0.1-20031127
  +OpenPKG 1.3  <= screen-3.9.15-1.3.0  >= screen-3.9.15-1.3.1
  +OpenPKG 1.2  <= screen-3.9.13-1.2.0  >= screen-3.9.13-1.2.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a posting on Bugtraq [1], Timo Sirainen fixed a buffer
  +  overflow bug which allows privilege escalation in the Virtual Screen
  +  Manager "screen" [2], whose executable is installed setuid-root. It
  +  also has some potential for attackers getting control of another
  +  user's screen. Transfer of approximately two gigabytes of data is
  +  required to exploit this vulnerability.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  screen". If you have the "screen" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the current release OpenPKG 1.3, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get screen-3.9.15-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig screen-3.9.15-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild screen-3.9.15-1.3.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/screen-3.9.15-1.3.1.*.rpm
  +
  +
  +References:
  +  [1] http://www.securityfocus.com/archive/1/345844/2003-11-24/2003-11-30/0
  +  [2] http://www.gnu.org/software/screen/
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.2/UPD/screen-3.9.13-1.2.1.src.rpm
  +  [

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-11-25 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   25-Nov-2003 14:38:00
  Branch: HEAD Handle: 2003112513375901

  Added files:
openpkg-web/securityOpenPKG-SA-2003.049-zebra.txt
  Modified files:
openpkg-web security.txt security.wml
openpkg-web/securitypage.pl

  Log:
SA-2003.049-zebra; CAN-2003-0795, CAN-2003-0858

  Summary:
RevisionChanges Path
1.56+1  -0  openpkg-web/security.txt
1.73+2  -0  openpkg-web/security.wml
1.1 +76 -0  openpkg-web/security/OpenPKG-SA-2003.049-zebra.txt
1.32+1  -1  openpkg-web/security/page.pl
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.55 -r1.56 security.txt
  --- openpkg-web/security.txt  11 Nov 2003 20:08:05 -  1.55
  +++ openpkg-web/security.txt  25 Nov 2003 13:37:59 -  1.56
  @@ -1,3 +1,4 @@
  +25-Nov-2003: Security Advisory: S
   11-Nov-2003: Security Advisory: S
   30-Oct-2003: Security Advisory: S
   28-Oct-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.72 -r1.73 security.wml
  --- openpkg-web/security.wml  30 Oct 2003 10:48:39 -  1.72
  +++ openpkg-web/security.wml  25 Nov 2003 13:37:59 -  1.73
  @@ -76,6 +76,8 @@
   
   
   
  +  
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.049-zebra.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.049-zebra.txt
  --- /dev/null 2003-11-25 14:38:00.0 +0100
  +++ OpenPKG-SA-2003.049-zebra.txt 2003-11-25 14:38:00.0 +0100
  @@ -0,0 +1,76 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.049  25-Nov-2003
  +
  +
  +Package: zebra
  +Vulnerability:   denial of service
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= zebra-0.93b-20031001 >= zebra-0.93b-20031113 
  +OpenPKG 1.3  <= zebra-0.93b-1.3.0>= zebra-0.93b-1.3.1
  +OpenPKG 1.2  <= zebra-0.93b-1.2.0>= zebra-0.93b-1.2.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  Jonny Robertson reported that Zebra can be remotely crashed if a
  +  remote attacker can connect to the Zebra telnet management port [0].
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0795 [1] to the problem.
  +
  +  Herbert Xu reported that Zebra can accept spoofed messages sent on the
  +  kernel netlink interface by other users on the local machine [2]. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0858 [3] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  zebra". If you have the "zebra" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [4][5]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror
  +  location, verify its integrity [10], build a corresponding binary
  +  RPM from it [4] and update your OpenPKG installation by applying the
  +  binary RPM [5]. For the current release OpenPKG 1.3, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get zebra-0.93b-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig zebra-0.93b-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild zebra-0.93b-1.3.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/zebra-0.93b-1.3.1.*.rpm
  +
  +
  +References:
  +  [0] http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=107140
  +  [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795  
  +  [2] http://bugzilla.redhat.com/bugzilla/sh

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-10-30 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   30-Oct-2003 11:48:40
  Branch: HEAD Handle: 2003103010483901

  Added files:
openpkg-web/securityOpenPKG-SA-2003.047-postgresql.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
link in PostgreSQL security advisory

  Summary:
RevisionChanges Path
1.54+1  -0  openpkg-web/security.txt
1.72+1  -0  openpkg-web/security.wml
1.1 +88 -0  openpkg-web/security/OpenPKG-SA-2003.047-postgresql.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.53 -r1.54 security.txt
  --- openpkg-web/security.txt  28 Oct 2003 14:46:56 -  1.53
  +++ openpkg-web/security.txt  30 Oct 2003 10:48:39 -  1.54
  @@ -1,3 +1,4 @@
  +30-Oct-2003: Security Advisory: S
   28-Oct-2003: Security Advisory: S
   19-Oct-2003: Security Advisory: S
   30-Sep-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.71 -r1.72 security.wml
  --- openpkg-web/security.wml  28 Oct 2003 14:46:56 -  1.71
  +++ openpkg-web/security.wml  30 Oct 2003 10:48:39 -  1.72
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.047-postgresql.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.047-postgresql.txt
  --- /dev/null 2003-10-30 11:48:40.0 +0100
  +++ OpenPKG-SA-2003.047-postgresql.txt2003-10-30 11:48:40.0 +0100
  @@ -0,0 +1,88 @@
  +-BEGIN PGP SIGNED MESSAGE-
  +Hash: SHA1
  +
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.047  30-Oct-2003
  +
  +
  +Package: postgresql
  +Vulnerability:   remote code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:   Corrected Packages:
  +OpenPKG CURRENT  <= postgresql-7.3.3-20030723 >= postgresql-7.3.4-20030725
  +OpenPKG 1.3  N.A. none
  +OpenPKG 1.2  <= postgresql-7.3.1-1.2.2>= postgresql-7.3.1-1.2.3
  +
  +Dependent Packages:  none
  +
  +Description:
  +  Two bugs leading to a buffer overflow in the PostgreSQL [0] RDBMS,
  +  versions 7.2.x and 7.3.x prior to 7.3.4, were discovered. The
  +  vulnerability exists in the PostgreSQL abstract data type (ADT) to
  +  ASCII conversion functions.
  +  
  +  It has been conjectured that excessive data passed to the involved
  +  to_ascii_xxx() functions may overrun the bounds of an insufficient
  +  buffer reserved in heap memory, resulting in the corruption of heap
  +  based memory management structures that are adjacent to it. It is
  +  currently believed that under the correct circumstances an attacker
  +  may use this to execute arbitrary instructions in the context of the
  +  PostgreSQL server.
  +  
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0901 [1] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  postgresql". If you have the "postgresql" package installed and its
  +  version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution). [2][3]
  +
  +Solution:
  +  Select the updated source RPM appropriate for the OpenPKG release
  +  [4], fetch it from the OpenPKG FTP service [5] or a mirror location,
  +  verify its integrity [6], build a corresponding binary RPM from it
  +  [2] and update your OpenPKG installation by applying the binary RPM
  +  [3]. For the release OpenPKG 1.2, perform the following operations
  +  to permanently fix the security problem (for other releases adjust
  +  accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.2/UPD
  +  ftp> get postgresql-7.3.1-1.2.3.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig postgresql-7.3.1-1.2.3.src.rpm
  +  $ /bin/rpm --rebuild postgresql-7.3.1-1.2.3.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/postgresql-7.3.

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-10-28 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   28-Oct-2003 15:46:56
  Branch: HEAD Handle: 2003102814465600

  Added files:
openpkg-web/securityOpenPKG-SA-2003.046-apache.txt
  Modified files:
openpkg-web security.txt security.wml
openpkg-web/securitypage.pl

  Log:
SA-2003.046-apache; CAN-2003-0542

  Summary:
RevisionChanges Path
1.53+1  -0  openpkg-web/security.txt
1.71+1  -0  openpkg-web/security.wml
1.1 +71 -0  openpkg-web/security/OpenPKG-SA-2003.046-apache.txt
1.30+1  -1  openpkg-web/security/page.pl
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.52 -r1.53 security.txt
  --- openpkg-web/security.txt  19 Oct 2003 07:16:29 -  1.52
  +++ openpkg-web/security.txt  28 Oct 2003 14:46:56 -  1.53
  @@ -1,3 +1,4 @@
  +28-Oct-2003: Security Advisory: S
   19-Oct-2003: Security Advisory: S
   30-Sep-2003: Security Advisory: S
   24-Sep-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.70 -r1.71 security.wml
  --- openpkg-web/security.wml  19 Oct 2003 07:16:29 -  1.70
  +++ openpkg-web/security.wml  28 Oct 2003 14:46:56 -  1.71
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.046-apache.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.046-apache.txt
  --- /dev/null 2003-10-28 15:46:56.0 +0100
  +++ OpenPKG-SA-2003.046-apache.txt2003-10-28 15:46:56.0 +0100
  @@ -0,0 +1,71 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.046  29-Oct-2003
  +
  +
  +Package: apache
  +Vulnerability:   local regex backreference overflow
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= apache-1.3.28-20031009   >= apache-1.3.29-20031028
  +OpenPKG 1.3  <= apache-1.3.28-1.3.0  >= apache-1.3.28-1.3.1
  +OpenPKG 1.2  <= apache-1.3.27-1.2.2  >= apache-1.3.27-1.2.3
  +
  +Dependent Packages:  none
  +
  +Description:
  +  Andre Malo fixed problems [0] in the mod_alias and mod_rewrite
  +  modules of the Apache [1] webserver. Buffer overflows occurred if a
  +  regular expression with more than 9 captures were configured. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0542 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  apache". If you have the "apache" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the current release OpenPKG 1.3, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get apache-1.3.28-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig apache-1.3.28-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild apache-1.3.28-1.3.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/apache-1.3.28-1.3.1.*.rpm
  +
  +
  +References:
  +  [0] http://marc.theaimsgroup.com/?l=apache-cvs&m=106701190026083
  +  [1] http://httpd.apache.org/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.2/UPD/apache-1.3.27-1.2.3.src.rpm
  +  [6] f

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-10-19 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   19-Oct-2003 09:16:29
  Branch: HEAD Handle: 2003101908162900

  Added files:
openpkg-web/securityOpenPKG-SA-2003.045-ircd.txt
  Modified files:
openpkg-web security.txt security.wml
openpkg-web/securitypage.pl

  Log:
SA-2003.045-ircd; CAN-2003-0864

  Summary:
RevisionChanges Path
1.52+1  -0  openpkg-web/security.txt
1.70+1  -0  openpkg-web/security.wml
1.1 +72 -0  openpkg-web/security/OpenPKG-SA-2003.045-ircd.txt
1.29+1  -1  openpkg-web/security/page.pl
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.51 -r1.52 security.txt
  --- openpkg-web/security.txt  30 Sep 2003 12:47:11 -  1.51
  +++ openpkg-web/security.txt  19 Oct 2003 07:16:29 -  1.52
  @@ -1,3 +1,4 @@
  +19-Oct-2003: Security Advisory: S
   30-Sep-2003: Security Advisory: S
   24-Sep-2003: Security Advisory: S
   24-Sep-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.69 -r1.70 security.wml
  --- openpkg-web/security.wml  30 Sep 2003 12:47:11 -  1.69
  +++ openpkg-web/security.wml  19 Oct 2003 07:16:29 -  1.70
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.045-ircd.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.045-ircd.txt
  --- /dev/null 2003-10-19 09:16:29.0 +0200
  +++ OpenPKG-SA-2003.045-ircd.txt  2003-10-19 09:16:29.0 +0200
  @@ -0,0 +1,72 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.045  19-Oct-2003
  +
  +
  +Package: ircd
  +Vulnerability:   remote denial of service vulnerability
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= ircd-2.10.3p3-20030725   >= ircd-2.10.3p4-20031012
  +OpenPKG 1.3  <= ircd-2.10.3p3-1.3.0  >= ircd-2.10.3p3-1.3.1
  +OpenPKG 1.2  <= ircd-2.10.3p3-1.2.0  >= ircd-2.10.3p3-1.2.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a report from Piotr Kucharski [0] a buffer overflow
  +  vulnerability exists in ircd [1] that allows a remote attacker to
  +  crash the ircd server, thus causing a denial of service condition.
  +
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0864 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  ircd". If you have the "ircd" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.3, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get ircd-2.10.3p3-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig ircd-2.10.3p3-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild ircd-2.10.3p3-1.3.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/ircd-2.10.3p3-1.3.1.*.rpm
  +
  +
  +References:
  +  [0] http://www.securityfocus.com/archive/1/341099
  +  [1] http://www.irc.org/servers.html
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0864
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.2/UPD/ircd-2.10.3p3-1.2.1.src.rpm
  +  [6] ftp://ftp.op

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-09-30 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   30-Sep-2003 14:47:11
  Branch: HEAD Handle: 2003093013471100

  Added files:
openpkg-web/securityOpenPKG-SA-2003.044-openssl.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.044-openssl; CAN-2003-0543, CAN-2003-0544, CAN-2003-0545

  Summary:
RevisionChanges Path
1.51+1  -0  openpkg-web/security.txt
1.69+1  -0  openpkg-web/security.wml
1.1 +158 -0 openpkg-web/security/OpenPKG-SA-2003.044-openssl.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.50 -r1.51 security.txt
  --- openpkg-web/security.txt  24 Sep 2003 08:09:34 -  1.50
  +++ openpkg-web/security.txt  30 Sep 2003 12:47:11 -  1.51
  @@ -1,3 +1,4 @@
  +30-Sep-2003: Security Advisory: S
   24-Sep-2003: Security Advisory: S
   24-Sep-2003: Security Advisory: S
   19-Sep-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.68 -r1.69 security.wml
  --- openpkg-web/security.wml  24 Sep 2003 08:09:34 -  1.68
  +++ openpkg-web/security.wml  30 Sep 2003 12:47:11 -  1.69
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.044-openssl.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.044-openssl.txt
  --- /dev/null 2003-09-30 14:47:11.0 +0200
  +++ OpenPKG-SA-2003.044-openssl.txt   2003-09-30 14:47:11.0 +0200
  @@ -0,0 +1,158 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.044  30-Sep-2003
  +
  +
  +Package: openssl
  +Vulnerability:   denial of service, possibly arbitrary code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages: Corrected Packages:
  +OpenPKG CURRENT  <= openssl-0.9.7b-20030806 >= openssl-0.9.7b-20030930
  +OpenPKG 1.3  <= openssl-0.9.7b-1.3.1>= openssl-0.9.7b-1.3.2
  +OpenPKG 1.2  <= openssl-0.9.7-1.2.3 >= openssl-0.9.7-1.2.4
  +
  +Affected Releases:   Dependent Packages:
  +
  +OpenPKG CURRENT  apache* bind blender cadaver cfengine cpu cups curl
  + distcache dsniff easysoap ethereal* exim fetchmail
  + imap imapd imaputils inn jabberd kde-base kde-libs
  + linc links lynx mailsync meta-core mico* mixmaster
  + monit* mozilla mutt mutt15 nail neon nessus-libs
  + nmap openldap openssh openvpn perl-ssl pgadmin php*
  + pine* postfix* postgresql pound proftpd* qpopper
  + rdesktop samba samba3 sasl scanssh sendmail* siege
  + sio* sitecopy snmp socat squid* stunnel subversion
  + suck sysmon tcpdump tinyca w3m wget xmlsec
  +
  +OpenPKG 1.3  apache* bind cfengine cpu curl ethereal* fetchmail
  + imap imapd inn links lynx mico* mutt nail neon
  + openldap openssh perl-ssl php* postfix* postgresql
  + proftpd* qpopper rdesktop samba sasl scanssh
  + sendmail* siege sio* sitecopy snmp socat squid*
  + stunnel suck sysmon tcpdump tinyca w3m wget xmlsec
  +
  +OpenPKG 1.2  apache* bind cpu curl ethereal* fetchmail imap inn
  + links lynx mico* mutt nail neon openldap openssh
  + perl-ssl postfix* postgresql qpopper rdesktop samba
  + sasl scanssh sendmail* siege sitecopy snmp socat
  + stunnel sysmon tcpdump tinyca w3m wget
  +
  + (*) marked packages are only affected if certain build
  + options ("with_xxx") were used at build time. See
  + Appendix below for details.
  +
  +Description:
  +  According to an OpenSSL [0] security advisory [1], multiple
  +  vulnerabilities exist in OpenSSL versions

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-09-24 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   24-Sep-2003 10:09:35
  Branch: HEAD Handle: 2003092409093401

  Added files:
openpkg-web/securityOpenPKG-SA-2003.043-proftpd.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.043-proftpd; CAN unknown

  Summary:
RevisionChanges Path
1.50+1  -0  openpkg-web/security.txt
1.68+1  -0  openpkg-web/security.wml
1.1 +86 -0  openpkg-web/security/OpenPKG-SA-2003.043-proftpd.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.49 -r1.50 security.txt
  --- openpkg-web/security.txt  24 Sep 2003 08:08:10 -  1.49
  +++ openpkg-web/security.txt  24 Sep 2003 08:09:34 -  1.50
  @@ -1,3 +1,4 @@
  +24-Sep-2003: Security Advisory: S
   24-Sep-2003: Security Advisory: S
   19-Sep-2003: Security Advisory: S
   17-Sep-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.67 -r1.68 security.wml
  --- openpkg-web/security.wml  24 Sep 2003 08:08:10 -  1.67
  +++ openpkg-web/security.wml  24 Sep 2003 08:09:34 -  1.68
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.043-proftpd.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.043-proftpd.txt
  --- /dev/null 2003-09-24 10:09:35.0 +0200
  +++ OpenPKG-SA-2003.043-proftpd.txt   2003-09-24 10:09:35.0 +0200
  @@ -0,0 +1,86 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.043  24-Sep-2003
  +
  +
  +Package: proftpd
  +Vulnerability:   arbitrary code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:   Corrected Packages:
  +OpenPKG CURRENT  <= proftpd-1.2.9rc2-20030911 >= proftpd-1.2.9rc2-20030923
  +OpenPKG 1.3  <= proftpd-1.2.8-1.3.0   >= proftpd-1.2.8-1.3.1
  +OpenPKG 1.2  <= proftpd-1.2.7-1.2.0   >= proftpd-1.2.7-1.2.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a ISS X-Force security advisory [0] a vulnerability
  +  exists in the ProFTPD server [1]. It can be triggered by remote
  +  attackers when transferring files from the FTP server in ASCII mode.
  +  The attacker must have the ability to upload a file to the server, and
  +  then attempt to download the same file to trigger the vulnerability.
  +  During ASCII transfer, file data is examined in 1024 byte chunks
  +  to check for newline characters. The translation of these newline
  +  characters is not handled correctly, and a buffer overflow can
  +  manifest if ProFTPD parses a specially crafted file.
  +
  +  Note that the OpenPKG 20030923 version of the proftpd package contains
  +  the vendor version 1.2.9rc2p, also the trailing 'p' was omitted from
  +  the package filename.
  +
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-FIXME [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q proftpd". If you have the "proftpd" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade
  +  it (see Solution) and it's dependent packages (see above), if any,
  +  too. [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.3, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get proftpd-1.2.8-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig proftpd-1.2.8-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild 

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-09-24 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   24-Sep-2003 10:08:11
  Branch: HEAD Handle: 2003092409081001

  Added files:
openpkg-web/securityOpenPKG-SA-2003.042-openssh.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.042-openssh; CAN-2003-0786, CAN-2003-0787

  Summary:
RevisionChanges Path
1.49+1  -0  openpkg-web/security.txt
1.67+1  -0  openpkg-web/security.wml
1.1 +78 -0  openpkg-web/security/OpenPKG-SA-2003.042-openssh.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.48 -r1.49 security.txt
  --- openpkg-web/security.txt  19 Sep 2003 08:14:36 -  1.48
  +++ openpkg-web/security.txt  24 Sep 2003 08:08:10 -  1.49
  @@ -1,3 +1,4 @@
  +24-Sep-2003: Security Advisory: S
   19-Sep-2003: Security Advisory: S
   17-Sep-2003: Security Advisory: S
   15-Sep-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.66 -r1.67 security.wml
  --- openpkg-web/security.wml  19 Sep 2003 08:14:36 -  1.66
  +++ openpkg-web/security.wml  24 Sep 2003 08:08:10 -  1.67
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.042-openssh.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.042-openssh.txt
  --- /dev/null 2003-09-24 10:08:11.0 +0200
  +++ OpenPKG-SA-2003.042-openssh.txt   2003-09-24 10:08:11.0 +0200
  @@ -0,0 +1,78 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.042  24-Sep-2003
  +
  +
  +Package: openssh
  +Vulnerability:   remote root exploit
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= openssh-3.7.1p1-20030917 >= openssh-3.7.1p2-20030923
  +OpenPKG 1.3  N.A.
  +OpenPKG 1.2  N.A.
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a Portable OpenSSH Security Advisory [0] versions 3.7p1
  +  and 3.7.1p1 of portable OpenSSH [1] contain multiple vulnerabilities
  +  in the new PAM code. At least one of these bugs is remotely
  +  exploitable with privsep disabled. Older versions of portable OpenSSH
  +  are not vulnerable. OpenPKG installations are only affected if the
  +  package was build with option "with_pam" set to "yes" -- which is not
  +  the default.
  +
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the
  +  id CAN-2003-0786 [2] to the problem where SSH1 PAM challenge response
  +  auth ignored the result of the authentication with privsep off.
  +
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0787 [3] to the problem where the PAM conversation function
  +  trashed the stack.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  openssh". If you have the "openssh" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [4][5]
  +
  +Solution:
  +  Select the updated source RPM appropriate for OpenPKG CURRENT [6]
  +  fetch it from the OpenPKG FTP service [7] or a mirror location,
  +  build a corresponding binary RPM from it [4] and update your OpenPKG
  +  installation by applying the binary RPM [5]. Perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd current/SRC
  +  ftp> get openssh-3.7.1p2-20030923.src.rpm
  +  ftp> bye
  +  $ /bin/rpm --rebuild openssh-3.7.1p2-20030923.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/openssh-3.7.1p2-20030923.*.rpm
  +
  +
  +References:
  +  [0] http://www.openssh.com/txt/sshpam.adv
  +  [1] http://www.openssh.com/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0786
  + 

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-09-16 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   17-Sep-2003 08:59:38
  Branch: HEAD Handle: 2003091707593701

  Added files:
openpkg-web/securityOpenPKG-SA-2003.040-openssh.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.040-openssh; CAN-2003-0693

  Summary:
RevisionChanges Path
1.46+1  -0  openpkg-web/security.txt
1.65+1  -0  openpkg-web/security.wml
1.1 +73 -0  openpkg-web/security/OpenPKG-SA-2003.040-openssh.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.45 -r1.46 security.txt
  --- openpkg-web/security.txt  15 Sep 2003 13:27:23 -  1.45
  +++ openpkg-web/security.txt  17 Sep 2003 06:59:37 -  1.46
  @@ -1,3 +1,4 @@
  +16-Sep-2003: Security Advisory: S
   15-Sep-2003: Security Advisory: S
   15-Sep-2003: Security Advisory: S
   28-Aug-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.64 -r1.65 security.wml
  --- openpkg-web/security.wml  16 Sep 2003 10:21:12 -  1.64
  +++ openpkg-web/security.wml  17 Sep 2003 06:59:37 -  1.65
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.040-openssh.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.040-openssh.txt
  --- /dev/null 2003-09-17 08:59:38.0 +0200
  +++ OpenPKG-SA-2003.040-openssh.txt   2003-09-17 08:59:38.0 +0200
  @@ -0,0 +1,73 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.040  17-Sep-2003
  +
  +
  +Package: openssh
  +Vulnerability:   arbitrary code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= openssh-3.6.1p2-20030729 >= openssh-3.7p1-20030916
  +OpenPKG 1.3  <= openssh-3.6.1p2-1.3.0>= openssh-3.6.1p2-1.3.1
  +OpenPKG 1.2  <= openssh-3.5p1-1.2.2  >= openssh-3.5p1-1.2.3
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a OpenSSH Security Advisory [0] all versions of OpenSSH's
  +  sshd prior to 3.7.1 contain buffer management errors [1]. Those
  +  may allow remote attackers to execute arbitrary code by causing an
  +  incorrect amount of memory to be freed and corrupting the heap
  +
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0693 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  openssh". If you have the "openssh" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the current release OpenPKG 1.3, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get openssh-3.6.1p2-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig openssh-3.6.1p2-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild openssh-3.6.1p2-1.3.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/openssh-3.6.1p2-1.3.1.*.rpm
  +
  +
  +References:
  +  [0] http://www.openssh.com/txt/buffer.adv
  +  [1] http://www.openssh.com/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0693
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.2/UPD/openssh-3.6.1p2-1.3.1.src.rpm
  +  [6] ftp://ftp.openpkg.org/relea

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-09-15 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   15-Sep-2003 15:27:24
  Branch: HEAD Handle: 2003091514272300

  Added files:
openpkg-web/securityOpenPKG-SA-2003.039-perl.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.039-perl; CAN-2003-0615

  Summary:
RevisionChanges Path
1.45+1  -0  openpkg-web/security.txt
1.63+1  -0  openpkg-web/security.wml
1.1 +90 -0  openpkg-web/security/OpenPKG-SA-2003.039-perl.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.44 -r1.45 security.txt
  --- openpkg-web/security.txt  15 Sep 2003 11:33:39 -  1.44
  +++ openpkg-web/security.txt  15 Sep 2003 13:27:23 -  1.45
  @@ -1,3 +1,4 @@
  +15-Sep-2003: Security Advisory: S
   15-Sep-2003: Security Advisory: S
   28-Aug-2003: Security Advisory: S
   06-Aug-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.62 -r1.63 security.wml
  --- openpkg-web/security.wml  15 Sep 2003 11:33:39 -  1.62
  +++ openpkg-web/security.wml  15 Sep 2003 13:27:23 -  1.63
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.039-perl.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.039-perl.txt
  --- /dev/null 2003-09-15 15:27:24.0 +0200
  +++ OpenPKG-SA-2003.039-perl.txt  2003-09-15 15:27:24.0 +0200
  @@ -0,0 +1,90 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.039  15-Sep-2003
  +
  +
  +Package: perl (CGI.pm)
  +Vulnerability:   cross site scripting
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:Corrected Packages:
  +OpenPKG CURRENT  <= perl-5.8.0-20030903>= perl-5.8.0-20030915
  +OpenPKG 1.3  <= perl-5.8.0-1.3.0   >= perl-5.8.0-1.3.1
  +OpenPKG 1.2  <= perl-5.8.0-1.2.0   >= perl-5.8.0-1.2.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  This message is a continuation of OpenPKG-SA-2003.036-perl-www [0].
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the
  +  id CAN-2003-0615 [1] to the problem described. This document also
  +  outlines a important problematic regarding the native load order of
  +  perl modules.
  +  
  +  The CGI.pm module not only comes with the "perl-www" package but a
  +  ancient version 2.81 is also embedded into "perl". The corrected
  +  packages mentioned above have the official fix backported to the
  +  embedded version.
  +
  +  Be aware that all releases of OpenPKG up to and including 1.3 use
  +  Perl's native load order of modules. Embedded modules are preferred
  +  over additional modules. This means that CGI.pm embedded into the
  +  "perl" package is loaded before the sibling from the additional
  +  "perl-www" package is found. This inhibits the use and correction of
  +  additional modules with same name as embedded ones.
  +
  +  It should be noted that beginning with perl-5.8.0-20030903 the load
  +  order is patched to prefer additional modules [2]. There are no plans
  +  modifiying the module load order of the "perl" package in existing
  +  releases. Although more intuitive it would change existing behaviour
  +  and is likely to break existing installations. During the support
  +  lifecycle security advisories and corrected packages will be issued
  +  for both, embedded and additional packages.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  perl". If you have the "perl" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-09-15 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   15-Sep-2003 13:33:39
  Branch: HEAD Handle: 2003091512333900

  Added files:
openpkg-web/securityOpenPKG-SA-2003.038-mysql.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.038-mysql; CAN-2003-0780

  Summary:
RevisionChanges Path
1.44+1  -0  openpkg-web/security.txt
1.62+1  -0  openpkg-web/security.wml
1.1 +77 -0  openpkg-web/security/OpenPKG-SA-2003.038-mysql.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.43 -r1.44 security.txt
  --- openpkg-web/security.txt  28 Aug 2003 08:37:00 -  1.43
  +++ openpkg-web/security.txt  15 Sep 2003 11:33:39 -  1.44
  @@ -1,3 +1,4 @@
  +15-Sep-2003: Security Advisory: S
   28-Aug-2003: Security Advisory: S
   06-Aug-2003: Security Advisory: S
   06-Aug-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.61 -r1.62 security.wml
  --- openpkg-web/security.wml  28 Aug 2003 08:37:00 -  1.61
  +++ openpkg-web/security.wml  15 Sep 2003 11:33:39 -  1.62
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.038-mysql.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.038-mysql.txt
  --- /dev/null 2003-09-15 13:33:39.0 +0200
  +++ OpenPKG-SA-2003.038-mysql.txt 2003-09-15 13:33:39.0 +0200
  @@ -0,0 +1,77 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.mysql15-Sep-2003
  +
  +
  +Package: mysql
  +Vulnerability:   arbitrary code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= mysql-4.0.14-20030904>= mysql-4.0.15-20030910
  +OpenPKG 1.3  <= mysql-4.0.14-1.3.1   >= mysql-4.0.14-1.3.2
  +OpenPKG 1.2  <= mysql-3.23.54a-1.2.3 >= mysql-3.23.54a-1.2.4
  +
  +Dependent Packages:  none
  +
  +Description:
  +  Frank Denis <[EMAIL PROTECTED]> reported a vulnerability [0] in MySQL
  +  [1] affecting MySQL3 versions 3.0.57 and earlier and MySQL4 versions
  +  4.0.14 and earlier. Passwords of MySQL users are stored in the "User"
  +  table, part of the "mysql" database, specifically in the "Password"
  +  field. The passwords are hashed and stored as a 16 characters
  +  long hexadecimal value, specifically in the "Password" field.
  +  Unfortunately, a function involved in password checking misses correct
  +  bounds checking. By filling a "Password" field a value wider than 16
  +  characters, a buffer overflow will occur. The Common Vulnerabilities
  +  and Exposures (CVE) project assigned the id CAN-2003-0780 [2] to the
  +  problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  mysql". If you have the "mysql" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.3, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get mysql-4.0.14-1.3.2.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig mysql-4.0.14-1.3.2.src.rpm
  +  $ /bin/rpm --rebuild mysql-4.0.14-1.3.2.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/mysql-4.0.14-1.3.2.*.rpm
  +
  +
  +References:
  +  [0] http://www.securityfocus.com/archive/1/337012/2003-09-05/2003-09-11

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-08-14 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   06-Aug-2003 17:26:43
  Branch: HEAD Handle: 2003080616264201

  Added files:
openpkg-web/securityOpenPKG-SA-2003.036-perl-www.txt
  Modified files:
openpkg-web security.txt security.wml
openpkg-web/securitypage.pl

  Log:
OpenPKG-SA-2003.036-perl-www; CAN-2003-0615

  Summary:
RevisionChanges Path
1.42+1  -0  openpkg-web/security.txt
1.60+1  -0  openpkg-web/security.wml
1.1 +75 -0  openpkg-web/security/OpenPKG-SA-2003.036-perl-www.txt
1.21+1  -1  openpkg-web/security/page.pl
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.41 -r1.42 security.txt
  --- openpkg-web/security.txt  6 Aug 2003 13:07:50 -   1.41
  +++ openpkg-web/security.txt  6 Aug 2003 15:26:42 -   1.42
  @@ -1,3 +1,4 @@
  +06-Aug-2003: Security Advisory: S
   06-Aug-2003: Security Advisory: S
   10-Jul-2003: Security Advisory: S
   10-Jul-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.59 -r1.60 security.wml
  --- openpkg-web/security.wml  6 Aug 2003 13:07:50 -   1.59
  +++ openpkg-web/security.wml  6 Aug 2003 15:26:42 -   1.60
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.036-perl-www.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.036-perl-www.txt
  --- /dev/null 2003-08-06 17:26:43.0 +0200
  +++ OpenPKG-SA-2003.036-perl-www.txt  2003-08-06 17:26:43.0 +0200
  @@ -0,0 +1,75 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.perl-www 06-Aug-2003
  +
  +
  +Package: perl-www
  +Vulnerability:   CGI.pm cross site scripting
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:Corrected Packages:
  +OpenPKG CURRENT  <= perl-www-20030726-20030726 >= perl-www-20030802-20030802
  +OpenPKG 1.3  <= perl-www-1.3.0-1.3.0   >= perl-www-1.3.1-1.3.1
  +OpenPKG 1.2  <= perl-www-1.2.0-1.2.0   >= perl-www-1.2.1-1.2.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a security advisory [0] from [EMAIL PROTECTED] a
  +  cross site scripting vulnerability exists in the start_form() function
  +  in CGI.pm [1]. The Common Vulnerabilities and Exposures (CVE) project
  +  assigned the id CAN-2003-0615 [2] to the problem.
  +
  +  Note that beginning with perl-www-20030609-20030609 and
  +  perl-www-1.3.0-1.3.0 a preliminary patch was already included which
  +  fixes the specific issue discussed in the original SA. The corrected
  +  packages include a more generalized patch.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q perl-www". If you have the "perl-www" package installed and its
  +  version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution).
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the current release OpenPKG 1.2, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get perl-www-1.3.1-1.3.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig perl-www-1.3.1-1.3.1.src.rpm
  +  $ /bin/rpm --rebuild perl-www-1.3.1-1.3.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/perl-www-1.3.1-1.3.1.*.rpm
  +
  +
  +References:
  +  [0] http://eyeonsecurity.org/advisories/CGI.pm/adv.html
  +  [1] http://stein.cshl.org/WWW/software/CGI/
  +  [2] http://cve.mitre.org/cg

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-08-14 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   06-Aug-2003 15:07:51
  Branch: HEAD Handle: 2003080614075000

  Added files:
openpkg-web/securityOpenPKG-SA-2003.035-openssh.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
OpenPKG-SA-2003.035-openssh; CAN-2003-0190

  Summary:
RevisionChanges Path
1.41+1  -0  openpkg-web/security.txt
1.59+1  -0  openpkg-web/security.wml
1.1 +80 -0  openpkg-web/security/OpenPKG-SA-2003.035-openssh.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.40 -r1.41 security.txt
  --- openpkg-web/security.txt  10 Jul 2003 14:22:48 -  1.40
  +++ openpkg-web/security.txt  6 Aug 2003 13:07:50 -   1.41
  @@ -1,3 +1,4 @@
  +06-Aug-2003: Security Advisory: S
   10-Jul-2003: Security Advisory: S
   10-Jul-2003: Security Advisory: S
   07-Jul-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.58 -r1.59 security.wml
  --- openpkg-web/security.wml  5 Aug 2003 08:47:06 -   1.58
  +++ openpkg-web/security.wml  6 Aug 2003 13:07:50 -   1.59
  @@ -76,6 +76,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.035-openssh.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.035-openssh.txt
  --- /dev/null 2003-08-06 15:07:51.0 +0200
  +++ OpenPKG-SA-2003.035-openssh.txt   2003-08-06 15:07:51.0 +0200
  @@ -0,0 +1,80 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.035  06-Aug-2003
  +
  +
  +Package: openssh
  +Vulnerability:   information leakage
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= openssh-3.6.1p1-20030423 >= openssh-3.6.1p2-20030429
  +OpenPKG 1.3  N/A
  +OpenPKG 1.2  <= openssh-3.5p1-1.2.1  >= openssh-3.5p1-1.2.2
  +
  +Description:
  +  According to a Mediaservice.net security advisory [0], a information
  +  leakage exists in OpenSSH [1] 3.6.1p1 and earlier with PAM support
  +  enabled. When a user does not exist, an error message is send
  +  immediately which allows remote attackers to determine valid usernames
  +  via a timing attack. OpenPKG installations are only affected when the
  +  package was build '--with_pam yes', which is not the default. We could
  +  only reproduce the problem on Linux. It seems FreeBSD and Solaris are
  +  not vulnerable, the patch does not affect their behaviour. However,
  +  the problem is related to the PAM configuration, not the operating
  +  system. Using a non-default configuration might leak information on
  +  other operating systems, too. On Linux systems, a valid workaround is
  +  to add a "nodelay" option to the pam_unix.so auth.
  +
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0190 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  openssh". If you have the "openssh" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution).
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5], fetch it from the OpenPKG FTP service [6] or a mirror location,
  +  verify its integrity [7], build a corresponding binary RPM from it [3]
  +  and update your OpenPKG installation by applying the binary RPM [4].
  +  For the current release OpenPKG 1.2, perform the following operations
  +  to permanently fix the security problem (for other releases adjust
  +  accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.2/UPD
  +  ftp> get openssh-3.5p1-1.2.2.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig openssh-3.5p1-1.2.2.src.rpm
  +  $ /bin/rpm --rebuild openssh-3.5p1-1.2.2.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/openssh-3.5p1-1.2.2.*.rp

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-07-10 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   10-Jul-2003 16:22:49
  Branch: HEAD Handle: 2003071015224801

  Added files:
openpkg-web/securityOpenPKG-SA-2003.034-imagemagick.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.034-imagemagick; CAN-2003-0455

  Summary:
RevisionChanges Path
1.40+1  -0  openpkg-web/security.txt
1.56+1  -0  openpkg-web/security.wml
1.1 +86 -0  openpkg-web/security/OpenPKG-SA-2003.034-imagemagick.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.39 -r1.40 security.txt
  --- openpkg-web/security.txt  10 Jul 2003 09:54:16 -  1.39
  +++ openpkg-web/security.txt  10 Jul 2003 14:22:48 -  1.40
  @@ -1,3 +1,4 @@
  +10-Jul-2003: Security Advisory: S
   10-Jul-2003: Security Advisory: S
   07-Jul-2003: Security Advisory: S
   11-Jun-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.55 -r1.56 security.wml
  --- openpkg-web/security.wml  10 Jul 2003 09:54:16 -  1.55
  +++ openpkg-web/security.wml  10 Jul 2003 14:22:48 -  1.56
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.034-imagemagick.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.034-imagemagick.txt
  --- /dev/null 2003-07-10 16:22:49.0 +0200
  +++ OpenPKG-SA-2003.034-imagemagick.txt   2003-07-10 16:22:49.0 +0200
  @@ -0,0 +1,86 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.034  10-Jul-2003
  +
  +
  +Package: imagemagick
  +Vulnerability:   create or overwrite files
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= imagemagick-5.5.6.0-20030409 >= imagemagick-5.5.7.0-20030512
  +OpenPKG 1.2  <= imagemagick-5.5.3.2-1.2.0>= imagemagick-5.5.3.2-1.2.1
  +OpenPKG 1.1  <= imagemagick-5.4.8.2-1.1.0>= imagemagick-5.4.8.2-1.1.1
  +
  +Affected Releases:   Dependent Packages:
  +OpenPKG CURRENT  bar quux
  +OpenPKG 1.2  bar quux
  +OpenPKG 1.1  bar 
  +
  +FIXME candidates
  +autotrace-0.31.1-20030707
  +tex4ht-20030119-20030707
  +wv-0.7.6-20030707
  +
  +Description:
  +  According to a Debian security advisory [0] imagemagick's libmagick
  +  [1] library, under certain circumstances, creates temporary files
  +  without taking appropriate security precautions. This vulnerability
  +  could be exploited by a local user to create or overwrite files with
  +  the privileges of another user who is invoking a program using this
  +  library. Research has shown that all versions of imagemagick before
  +  5.5.7.0 are affected. The Common Vulnerabilities and Exposures (CVE)
  +  project assigned the id CAN-2003-0455 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  imagemagick". If you have the "imagemagick" package installed and its
  +  version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution) and it's dependent packages (see above), if
  +  any, too. [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.2, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.2/UPD
  +  ftp> get imagemagick-5.5.3.2-1.2.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig imagemagick-5.5.3.2-1.2.1.src.rpm
  +  $ /bin/rpm --rebuild imagemagick-5.5.3.2-1.2.1.src.rpm
  +  $ su -

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-07-10 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   10-Jul-2003 11:54:17
  Branch: HEAD Handle: 2003071010541601

  Added files:
openpkg-web/securityOpenPKG-SA-2003.033-infozip.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.033-infozip; CAN-2003-0282

  Summary:
RevisionChanges Path
1.39+1  -0  openpkg-web/security.txt
1.55+1  -0  openpkg-web/security.wml
1.1 +94 -0  openpkg-web/security/OpenPKG-SA-2003.033-infozip.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.38 -r1.39 security.txt
  --- openpkg-web/security.txt  7 Jul 2003 13:48:08 -   1.38
  +++ openpkg-web/security.txt  10 Jul 2003 09:54:16 -  1.39
  @@ -1,3 +1,4 @@
  +10-Jul-2003: Security Advisory: S
   07-Jul-2003: Security Advisory: S
   11-Jun-2003: Security Advisory: S
   03-Jun-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.54 -r1.55 security.wml
  --- openpkg-web/security.wml  7 Jul 2003 13:48:08 -   1.54
  +++ openpkg-web/security.wml  10 Jul 2003 09:54:16 -  1.55
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.033-infozip.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.033-infozip.txt
  --- /dev/null 2003-07-10 11:54:17.0 +0200
  +++ OpenPKG-SA-2003.033-infozip.txt   2003-07-10 11:54:17.0 +0200
  @@ -0,0 +1,94 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.033  10-Jul-2003
  +
  +
  +Package: infozip
  +Vulnerability:   overwrite arbitrary files
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= infozip-20030306-20030708 >= infozip-20030710-20030710
  +OpenPKG 1.2  <= infozip-1.2.0-1.2.0   >= infozip-1.2.0-1.2.1
  +OpenPKG 1.1  <= infozip-1.1.0-1.1.0   >= infozip-1.1.0-1.1.1
  +
  +Dependent Packages:  none
  +
  +Affected Releases:   Dependent Packages:
  +OpenPKG CURRENT  bar quux
  +OpenPKG 1.2  bar quux
  +OpenPKG 1.1  bar 
  +
  +FIXME candidates
  +cvsweb  PreReq:   
  +docbook BuildPreReq:  
  +heise   PreReq: BuildPreReq:  
  +mozilla PreReq: BuildPreReq:  
  +pccts   BuildPreReq:  
  +sam2p   PreReq: BuildPreReq:  
  +sav BuildPreReq:  
  +saxon   BuildPreReq:  
  +tetex   BuildPreReq:  
  +tex4ht  BuildPreReq:  
  +
  +Description:
  +  A directory traversal vulnerability in UnZip 5.50 allows attackers to
  +  overwrite arbitrary files via invalid characters between two . (dot)
  +  characters, which are filtered and result in a ".." sequence. The
  +  corrected packages include a patch taken from RedHat [1] ensuring that
  +  non-printable characters do not make it possible for a malicious .zip
  +  file to write to parent directories unless the "-:" command line
  +  parameter is specified.  The Common Vulnerabilities and Exposures
  +  (CVE) project assigned the id CAN-2003-0282 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  infozip". If you have the "infozip" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution) and it's dependent packages (see above), if any, too.
  +  [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the current release OpenPKG 1.2, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-07-07 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   07-Jul-2003 15:48:09
  Branch: HEAD Handle: 2003070714480800

  Added files:
openpkg-web/securityOpenPKG-SA-2003.032-php.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.032-php; CAN-2002-0985, CAN-2002-0986, CAN-2003-0442

  Summary:
RevisionChanges Path
1.38+1  -0  openpkg-web/security.txt
1.54+1  -0  openpkg-web/security.wml
1.1 +93 -0  openpkg-web/security/OpenPKG-SA-2003.032-php.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.37 -r1.38 security.txt
  --- openpkg-web/security.txt  11 Jun 2003 11:04:36 -  1.37
  +++ openpkg-web/security.txt  7 Jul 2003 13:48:08 -   1.38
  @@ -1,3 +1,4 @@
  +07-Jul-2003: Security Advisory: S
   11-Jun-2003: Security Advisory: S
   03-Jun-2003: Security Advisory: S
   16-May-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.53 -r1.54 security.wml
  --- openpkg-web/security.wml  11 Jun 2003 11:04:36 -  1.53
  +++ openpkg-web/security.wml  7 Jul 2003 13:48:08 -   1.54
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.032-php.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.032-php.txt
  --- /dev/null 2003-07-07 15:48:08.0 +0200
  +++ OpenPKG-SA-2003.032-php.txt   2003-07-07 15:48:09.0 +0200
  @@ -0,0 +1,93 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.032  07-Jul-2003
  +
  +
  +Package: php, apache
  +Vulnerability:   XSS; bypass safe mode
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= php-4.3.1-20030516   >= php-4.3.2-20030529
  + <= apache-1.3.27-20030516   >= apache-1.3.27-20030529
  +OpenPKG 1.2  noneN.A.
  +OpenPKG 1.1  <= php-4.2.2-1.1.1  >= php-4.2.2-1.1.2
  + <= apache-1.3.26-1.1.4  >= apache-1.3.26-1.1.5
  +
  +Dependent Packages:  none
  +
  +Description:
  +  Wojciech Purczynski found [2] out that it is possible to allow remote
  +  attackers to bypass safe mode restrictions in PHP [1] 4.x to 4.2.2 and
  +  modify command line arguments to the MTA (e.g. sendmail) in the 5th
  +  argument to mail(), altering MTA behavior and possibly executing
  +  commands.  The Common Vulnerabilities and Exposures (CVE) project
  +  assigned the id CAN-2002-0985 [4] to the problem.
  +  
  +  Wojciech Purczynski also reported [2] that the mail function in PHP
  +  [1] 4.x to 4.2.2 does not filter ASCII control characters from its
  +  arguments, which could allow remote attackers to modify mail message
  +  content, including mail headers, and possibly use PHP as a "spam
  +  proxy." Depending on how The Common Vulnerabilities and Exposures
  +  (CVE) project assigned the id CAN-2002-0986 [5] to the problem.
  +
  +  A security advisory [3] states that in PHP [1] version 4.3.1 (but we
  +  at OpenPKG believe 4.2.x) and earlier, when transparent session ID
  +  support is enabled using the "session.use_trans_sid" option, the
  +  session ID is not escaped before use, which allows remote attackers to
  +  insert arbitrary script via the PHPSESSID parameter, The Common
  +  Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0442 [6] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q php". If you have the "php" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade
  +  it (see Solution).
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [9], fetch it from the OpenPKG FTP service [10] or a mirror
  +  location, verify its integrity [11], build a corresponding binary RPM
  +  from it

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-06-03 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   03-Jun-2003 14:11:25
  Branch: HEAD Handle: 2003060313112401

  Added files:
openpkg-web/securityOpenPKG-SA-2003.030-ghostscript.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.030-ghostscript; CAN-2003-0354; execute arbitrary commands

  Summary:
RevisionChanges Path
1.36+1  -0  openpkg-web/security.txt
1.52+1  -0  openpkg-web/security.wml
1.1 +99 -0  openpkg-web/security/OpenPKG-SA-2003.030-ghostscript.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.35 -r1.36 security.txt
  --- openpkg-web/security.txt  16 May 2003 09:39:04 -  1.35
  +++ openpkg-web/security.txt  3 Jun 2003 12:11:24 -   1.36
  @@ -1,3 +1,4 @@
  +03-Jun-2003: Security Advisory: S
   16-May-2003: Security Advisory: S
   07-Apr-2003: Security Advisory: S
   30-Mar-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.51 -r1.52 security.wml
  --- openpkg-web/security.wml  16 May 2003 09:39:04 -  1.51
  +++ openpkg-web/security.wml  3 Jun 2003 12:11:24 -   1.52
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.030-ghostscript.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.030-ghostscript.txt
  --- /dev/null 2003-06-03 14:11:25.0 +0200
  +++ OpenPKG-SA-2003.030-ghostscript.txt   2003-06-03 14:11:25.0 +0200
  @@ -0,0 +1,99 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.030  03-Jun-2003
  +
  +
  +Package: ghostscript
  +Vulnerability:   execute arbitrary commands
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  noneN.A.
  +OpenPKG 1.2  noneN.A.
  +OpenPKG 1.1  <= ghostscript-7.04-1.1.0   >= ghostscript-7.04-1.1.1 
  +
  +Dependent Packages:  none FIXME
  +
  +Affected Releases:   Dependent Packages: FIXME
  +OpenPKG CURRENT  bar quux
  +OpenPKG 1.2  bar quux
  +OpenPKG 1.1  bar 
  +
  +FIXME
  +gv.spec BuildPreReq: X11, xaw3d, ghostscript
  +gv.spec PreReq:  X11, xaw3d, ghostscript
  +latex2html.spec BuildPreReq: perl, ghostscript, tetex, png, netpbm
  +latex2html.spec PreReq:  perl, ghostscript, tetex, png, netpbm
  +libwmf.spec BuildPreReq: X11, libxml, freetype, zlib, png, jpeg, gd, 
ghostscript = %{V_ghostscript}
  +libwmf.spec PreReq:  X11, libxml, freetype, zlib, png, jpeg, gd, 
ghostscript = %{V_ghostscript}
  +lyx.specPreReq:  gv, ghostscript, ghostscript::with_x11 = yes
  +mgv.specPreReq:  X11, ghostscript
  +pstoedit.spec   BuildPreReq: ghostscript, gcc, png, zlib
  +pstoedit.spec   PreReq:  ghostscript
  +sam2p.spec  BuildPreReq: ghostscript, jpeg, gzip, infozip, make, gcc, perl, 
bash
  +sam2p.spec  PreReq:  ghostscript, jpeg, gzip, infozip
  +scribus.specBuildPreReq: qt, freetype, ghostscript, png, jpeg, tiff, zlib
  +scribus.specPreReq:  qt, freetype, ghostscript, png, jpeg, tiff, zlib
  +tex4ht.spec PreReq:  tetex, ghostscript, imagemagick
  +
  +Description:
  +  According to a RedHat security advisory [1] a flaw in unpatched
  +  versions of Ghostscript before 7.07 allows malicious postscript files
  +  to execute arbitrary commands even with -dSAFER enabled.  The Common
  +  Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0354 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  ghostscript". If you have the "ghostscript" package installed and its
  +  version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution) and it's dependent packages (see 

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-03-04 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   04-Mar-2003 16:37:41
  Branch: HEAD Handle: 2003030415373802

  Added files:
openpkg-web/securityOpenPKG-SA-2003.017-file.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.017-file

  Summary:
RevisionChanges Path
1.25+1  -0  openpkg-web/security.txt
1.41+1  -0  openpkg-web/security.wml
1.1 +75 -0  openpkg-web/security/OpenPKG-SA-2003.017-file.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.24 -r1.25 security.txt
  --- openpkg-web/security.txt  4 Mar 2003 13:06:10 -   1.24
  +++ openpkg-web/security.txt  4 Mar 2003 15:37:38 -   1.25
  @@ -1,3 +1,4 @@
  +04-Mar-2003: Security Advisory: S
   04-Mar-2003: Security Advisory: S
   04-Mar-2003: Security Advisory: S
   04-Mar-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.40 -r1.41 security.wml
  --- openpkg-web/security.wml  4 Mar 2003 13:06:10 -   1.40
  +++ openpkg-web/security.wml  4 Mar 2003 15:37:39 -   1.41
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.017-file.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.017-file.txt
  --- /dev/null 2003-03-04 16:37:40.0 +0100
  +++ OpenPKG-SA-2003.017-file.txt  2003-03-04 16:37:40.0 +0100
  @@ -0,0 +1,75 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.017  04-Mar-2003
  +
  +
  +Package: file
  +Vulnerability:   memory allocation problem, stack overflow
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= file-3.40-20030209   >= file-3.41-20030228
  +OpenPKG 1.2  <= file-3.39-1.2.0  >= file-3.39-1.2.1
  +OpenPKG 1.1  <= file-3.39-1.1.1  >= file-3.39-1.1.2
  +
  +Dependent Packages:  noneN.A.
  +
  +Description:
  +  Jeff Johnson found a memory allocation problem and David Endler found
  +  a stack overflow corruption problem in the file [0] "Automatic File
  +  Content Type Recognition Tool" version 3.41.  Nalin Dahyabhai improved
  +  ELF section and program header handling in file [0] version 3.40. We
  +  believe that file versions without those modifications are vulnerable
  +  to memory allocation and stack overflow problems which put security at
  +  risk.  We have backported the security relevant pieces of the 3.41 and
  +  3.40 vendor changes into OpenPKG releases using vendor version 3.39.
  +  
  +  Please check whether you are affected by running "/bin/rpm
  +  -q file". If you have the "file" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade
  +  it (see Solution). [2][3]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [4][5], fetch it from the OpenPKG FTP service [6][7] or a mirror
  +  location, verify its integrity [8], build a corresponding binary RPM
  +  from it [2] and update your OpenPKG installation by applying the binary
  +  RPM [3]. For the current release OpenPKG 1.2, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.2/UPD
  +  ftp> get file-3.39-1.2.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig file-3.39-1.2.1.src.rpm
  +  $ /bin/rpm --rebuild file-3.39-1.2.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/file-3.39-1.2.1.*.rpm
  +
  +
  +
  +References:
  +  [1] ftp://ftp.astron.com/pub/file/
  +  [2] http://www.openpkg.org/tutorial.html#regular-source
  +  [3] http://www.openpkg.org/tutorial.html#regular-binary
  +  [4] ftp://ftp.openpkg.org/release/1.1/UPD/file-3

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-03-04 Thread Michael van Elst
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael van Elst
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   04-Mar-2003 14:06:12
  Branch: HEAD Handle: 2003030413061001

  Added files:
openpkg-web/securityOpenPKG-SA-2003.016-sendmail.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.016; CAN-2002-133

  Summary:
RevisionChanges Path
1.24+2  -0  openpkg-web/security.txt
1.40+2  -0  openpkg-web/security.wml
1.1 +73 -0  openpkg-web/security/OpenPKG-SA-2003.016-sendmail.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.23 -r1.24 security.txt
  --- openpkg-web/security.txt  4 Mar 2003 10:26:04 -   1.23
  +++ openpkg-web/security.txt  4 Mar 2003 13:06:10 -   1.24
  @@ -1,3 +1,5 @@
  +04-Mar-2003: Security Advisory: S
  +04-Mar-2003: Security Advisory: S
   04-Mar-2003: Security Advisory: S
   19-Feb-2003: Security Advisory: S
   19-Feb-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.39 -r1.40 security.wml
  --- openpkg-web/security.wml  4 Mar 2003 10:26:04 -   1.39
  +++ openpkg-web/security.wml  4 Mar 2003 13:06:10 -   1.40
  @@ -78,6 +78,8 @@
   
   
   
  +  
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.016-sendmail.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.016-sendmail.txt
  --- /dev/null 2003-03-04 14:06:12.0 +0100
  +++ OpenPKG-SA-2003.016-sendmail.txt  2003-03-04 14:06:12.0 +0100
  @@ -0,0 +1,73 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.016  04-Mar-2003
  +
  +
  +Package: sendmail
  +Vulnerability:   buffer overflow
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= sendmail-8.12.7-20030205 >= sendmail-8.12.8-20030304
  +OpenPKG 1.2  <= sendmail-8.12.7-1.2.0>= sendmail-8.12.4-1.2.1
  +OpenPKG 1.1  noneN.A.
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a ISS X-Force [0], a buffer overflow vulnerability
  +  exists in all sendmail versions from 5.79 to 8.12.7 [1]. Attackers
  +  may remotely exploit this vulnerability to gain "root" or superuser
  +  control of any vulnerable Sendmail server. The Common Vulnerabilities
  +  and Exposures (CVE) project assigned the id CAN-2002-1337 [2] to the
  +  problem.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q sendmail". If you have the "sendmail" package installed and its
  +  version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5], fetch it from the OpenPKG FTP service [6] or a mirror location,
  +  verify its integrity [7], build a corresponding binary RPM from it [3]
  +  and update your OpenPKG installation by applying the binary RPM [4].
  +  For the current release OpenPKG 1.2, perform the following operations
  +  to permanently fix the security problem (for other releases adjust
  +  accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.2/UPD
  +  ftp> get sendmail-8.12.7-1.2.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig sendmail-8.12.7-1.2.1.src.rpm
  +  $ /bin/rpm --rebuild sendmail-8.12.7-1.2.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/sendmail-8.12.7-1.2.1.*.rpm
  +
  +
  +
  +References:
  +  [0] http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950
  +  [1] http://www.sendmail.org/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1337
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.2/UPD/sendmail-8.12.7-1.2.1.src.rpm
  +  [6] ftp://ftp

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-02-19 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   19-Feb-2003 14:48:12
  Branch: HEAD Handle: 2003021913480704

  Added files:
openpkg-web/securityOpenPKG-SA-2003.012-dhcpd.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.012-dhcpd; CAN-2003-0039

  Summary:
RevisionChanges Path
1.21+1  -0  openpkg-web/security.txt
1.37+1  -0  openpkg-web/security.wml
1.1 +87 -0  openpkg-web/security/OpenPKG-SA-2003.012-dhcpd.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.20 -r1.21 security.txt
  --- openpkg-web/security.txt  18 Feb 2003 15:13:05 -  1.20
  +++ openpkg-web/security.txt  19 Feb 2003 13:48:07 -  1.21
  @@ -1,3 +1,4 @@
  +19-Feb-2003: Security Advisory: S
   18-Feb-2003: Security Advisory: S
   18-Feb-2003: Security Advisory: S
   18-Feb-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.36 -r1.37 security.wml
  --- openpkg-web/security.wml  18 Feb 2003 15:13:05 -  1.36
  +++ openpkg-web/security.wml  19 Feb 2003 13:48:07 -  1.37
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.012-dhcpd.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.012-dhcpd.txt
  --- /dev/null 2003-02-19 14:48:11.0 +0100
  +++ OpenPKG-SA-2003.012-dhcpd.txt 2003-02-19 14:48:11.0 +0100
  @@ -0,0 +1,87 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.012  19-Feb-2003
  +
  +
  +Package: dhcpd
  +Vulnerability:   denial of service (packet storm)
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= dhcpd-3.0.1rc11-20030116 >= dhcpd-3.0.1rc11-20030219
  +OpenPKG 1.2  <= dhcpd-3.0.1rc11-1.2.0>= dhcpd-3.0.1rc11-1.2.1
  +OpenPKG 1.1  <= dhcpd-3.0.1rc9-1.1.1 >= dhcpd-3.0.1rc9-1.1.2
  +
  +Affected Releases:   Dependent Packages: none
  +
  +Description:
  +  Florian Lohoff discovered a bug [0] in dhcrelay which is part of the
  +  ISC DHCPD [1]. The bug is causing the relay agent to send a continuing
  +  packet storm towards the configured dhcp server(s) in case of a
  +  malicious BOOTP packet.  The Common Vulnerabilities and Exposures
  +  (CVE) project assigned the id CAN-2003-0039 [2] to the problem.
  +
  +  The update does not ultimately fix the root cause of the problem.
  +  However, it improves dhcrelay's compliance to RFC1542 [10] by
  +  rigorously supporting the requirements listed in section 4.1.1
  +  BOOTREQUEST Messages and thus limiting havoc wreaked to the network:
  +
  +  > The relay agent MUST silently discard BOOTREQUEST messages whose
  +  > 'hops' field exceeds the value 16.  A configuration option SHOULD be
  +  > provided to set this threshold to a smaller value if desired by the
  +  > network manager.  The default setting for a configurable threshold
  +  > SHOULD be 4.
  +
  +  The new configuration option is '-c', it defaults to 4, the range of
  +  parameter is between 0 and 16.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q dhcpd". If you have the "dhcpd" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade
  +  it (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.1, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.2/UPD
  +  ftp> get dhcpd-3.0.1rc11-1.2.

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-02-18 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   18-Feb-2003 16:13:07
  Branch: HEAD Handle: 2003021815130501

  Added files:
openpkg-web/securityOpenPKG-SA-2003.011-lynx.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.011-lynx; CAN-2002-1405

  Summary:
RevisionChanges Path
1.20+1  -0  openpkg-web/security.txt
1.36+1  -0  openpkg-web/security.wml
1.1 +75 -0  openpkg-web/security/OpenPKG-SA-2003.011-lynx.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.19 -r1.20 security.txt
  --- openpkg-web/security.txt  18 Feb 2003 15:03:24 -  1.19
  +++ openpkg-web/security.txt  18 Feb 2003 15:13:05 -  1.20
  @@ -1,3 +1,4 @@
  +18-Feb-2003: Security Advisory: S
   18-Feb-2003: Security Advisory: S
   18-Feb-2003: Security Advisory: S
   29-Jan-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.35 -r1.36 security.wml
  --- openpkg-web/security.wml  18 Feb 2003 15:03:24 -  1.35
  +++ openpkg-web/security.wml  18 Feb 2003 15:13:05 -  1.36
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.011-lynx.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.011-lynx.txt
  --- /dev/null 2003-02-18 16:13:07.0 +0100
  +++ OpenPKG-SA-2003.011-lynx.txt  2003-02-18 16:13:07.0 +0100
  @@ -0,0 +1,75 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.011  18-Feb-2003
  +
  +
  +Package: lynx
  +Vulnerability:   CRLF injection vulnerability
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= lynx-2.8.4-20020206  >= lynx-2.8.4-20021216
  +OpenPKG 1.2  <= N.A. >= lynx-2.8.4-1.2.0
  +OpenPKG 1.1  <= lynx-2.8.4-1.1.0 >= lynx-2.8.4-1.1.1
  +
  +Affected Releases:   Dependent Packages: none
  +
  +Description:
  +  Ulf Harnhammar posted information [0] reporting a "CRLF Injection"
  +  problem with Lynx [1] 2.8.4 and earlier.  It is possible to inject
  +  false HTTP headers into an HTTP request that is provided on the
  +  command line, via a URL containing encoded carriage return, line feed,
  +  and other whitespace characters.  This way, scripts that use Lynx for
  +  downloading files access the wrong site on a web server with multiple
  +  virtual hosts.  The Common Vulnerabilities and Exposures (CVE) project
  +  assigned the id CAN-2002-1405 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  lynx". If you have the "lynx" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5], fetch it from the OpenPKG FTP service [6] or a mirror location,
  +  verify its integrity [7], build a corresponding binary RPM from it [3]
  +  and update your OpenPKG installation by applying the binary RPM [4].
  +  For the release OpenPKG 1.1, perform the following operations to
  +  permanently fix the security problem (for other releases adjust
  +  accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.1/UPD
  +  ftp> get lynx-2.8.4-1.1.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig lynx-2.8.4-1.1.1.src.rpm
  +  $ /bin/rpm --rebuild lynx-2.8.4-1.1.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/lynx-2.8.4-1.1.1.*.rpm
  +
  +
  +References:
  +  [0] http://www.mail-archive.com/bugtraq@securityfocus.com/msg08897.html
  +  [1] http://lynx.isc.org/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1405
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpk

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-01-29 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   29-Jan-2003 13:01:19
  Branch: HEAD Handle: 2003012912011701

  Added files:
openpkg-web/securityOpenPKG-SA-2003.008-mysql.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
OpenPKG-SA-2003.008 fix mysql double free bug

  Summary:
RevisionChanges Path
1.17+1  -0  openpkg-web/security.txt
1.33+1  -0  openpkg-web/security.wml
1.1 +72 -0  openpkg-web/security/OpenPKG-SA-2003.008-mysql.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.16 -r1.17 security.txt
  --- openpkg-web/security.txt  23 Jan 2003 13:36:58 -  1.16
  +++ openpkg-web/security.txt  29 Jan 2003 12:01:17 -  1.17
  @@ -1,3 +1,4 @@
  +29-Jan-2003: Security Advisory: S
   23-Jan-2003: Security Advisory: S
   23-Jan-2003: Security Advisory: S
   22-Jan-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.32 -r1.33 security.wml
  --- openpkg-web/security.wml  23 Jan 2003 13:36:58 -  1.32
  +++ openpkg-web/security.wml  29 Jan 2003 12:01:17 -  1.33
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.008-mysql.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.008-mysql.txt
  --- /dev/null 2003-01-29 13:01:18.0 +0100
  +++ OpenPKG-SA-2003.008-mysql.txt 2003-01-29 13:01:18.0 +0100
  @@ -0,0 +1,72 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.008  29-Jan-2003
  +
  +
  +Package: mysql
  +Vulnerability:   double free can cause denial of service
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= mysql-3.23.54a-20030116  >= mysql-3.23.55-20030124
  +OpenPKG 1.2  <= mysql-3.23.54a-1.2.0 >= mysql-3.23.54a-1.2.1
  +OpenPKG 1.1  <= mysql-3.23.52-1.1.1  >= mysql-3.23.52-1.1.2
  +
  +Affected Releases:   Dependent Packages: none
  +
  +Description:
  +  Vincent Danen of MandrakeSoft noticed that according to the change log
  +  [0] for MySQL release 3.23.55 [1] a vulnerbility has been fixed where
  +  a double free pointer bug in mysql_change_user() handling enabled a
  +  specially hacked version of MySQL client to crash mysqld.  He
  +  extracted the fix for use in previous releases.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  mysql". If you have the "mysql" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [2][3]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [4][5], fetch it from the OpenPKG FTP service [6][7] or a mirror
  +  location, verify its integrity [8], build a corresponding binary RPM
  +  from it [2] and update your OpenPKG installation by applying the binary
  +  RPM [3]. For the current release OpenPKG 1.2, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.2/UPD
  +  ftp> get mysql-3.23.54a-1.2.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig mysql-3.23.54a-1.2.1.src.rpm
  +  $ /bin/rpm --rebuild mysql-3.23.54a-1.2.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/mysql-3.23.54a-1.2.1.*.rpm
  +
  +
  +References:
  +  [0] http://www.mysql.com/doc/en/News-3.23.55.html
  +  [1] http://www.mysql.com/
  +  [2] http://www.openpkg.org/tutorial.html#regular-source
  +  [3] http://www.openpkg.org/tutorial.html#regular-binary
  +  [4] ftp://ftp.openpkg.org/release/1.1/UPD/mysql-3.23.52-1.1.2.src.rpm
  +  [5] ftp://ftp.openpkg.org/release/1.2/UPD/mysql-3.23.54a-1.2.1.src.rpm
  +  [6] ftp://ftp.openpkg.org/release/1.1/UPD/
  +  [7] f

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-01-23 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   23-Jan-2003 14:36:59
  Branch: HEAD Handle: 2003012313365801

  Added files:
openpkg-web/securityOpenPKG-SA-2003.007-wget.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.007-wget; CAN-2002-1344

  Summary:
RevisionChanges Path
1.16+1  -0  openpkg-web/security.txt
1.32+1  -0  openpkg-web/security.wml
1.1 +72 -0  openpkg-web/security/OpenPKG-SA-2003.007-wget.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.15 -r1.16 security.txt
  --- openpkg-web/security.txt  23 Jan 2003 10:37:13 -  1.15
  +++ openpkg-web/security.txt  23 Jan 2003 13:36:58 -  1.16
  @@ -1,3 +1,4 @@
  +23-Jan-2003: Security Advisory: S
   23-Jan-2003: Security Advisory: S
   22-Jan-2003: Security Advisory: S
   21-Jan-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.31 -r1.32 security.wml
  --- openpkg-web/security.wml  22 Jan 2003 16:04:53 -  1.31
  +++ openpkg-web/security.wml  23 Jan 2003 13:36:58 -  1.32
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.007-wget.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.007-wget.txt
  --- /dev/null 2003-01-23 14:36:59.0 +0100
  +++ OpenPKG-SA-2003.007-wget.txt  2003-01-23 14:36:59.0 +0100
  @@ -0,0 +1,72 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.007  23-Jan-2003
  +
  +
  +Package: wget
  +Vulnerability:   directory traversal vulnerability
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= wget-1.8.2-20021206  >= wget-1.8.2-20021216
  +OpenPKG 1.2  <= none N.A.
  +OpenPKG 1.1  <= wget-1.8.2-1.1.0 >= wget-1.8.2-1.1.1
  +
  +Affected Releases:   Dependent Packages: none
  +
  +Description:
  +  According to research done by Steve Christey [0], directory traversal
  +  vulnerabilities exist in many FTP clients including wget [1].
  +  Resolution of this issue was handled primarily through Mark Cox of Red
  +  Hat whose patches were incorporated into the wget 1.8.2 HEAD
  +  development branch.  The Common Vulnerabilities and Exposures (CVE)
  +  project assigned the id CAN-2002-1344 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  wget". If you have the "wget" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5], fetch it from the OpenPKG FTP service [6] or a mirror location,
  +  verify its integrity [7], build a corresponding binary RPM from it [3]
  +  and update your OpenPKG installation by applying the binary RPM [4].
  +  For the release OpenPKG 1.1, perform the following operations to
  +  permanently fix the security problem (for other releases adjust
  +  accordingly).
  +
  +  $ rpm --rebuild ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.2/UPD
  +  ftp> get wget-1.8.2-1.1.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig wget-1.8.2-1.1.1.src.rpm
  +  $ /bin/rpm --rebuild wget-1.8.2-1.1.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/wget-1.8.2-1.1.1.*.rpm
  +
  +
  +References:
  +  [0] http://marc.theaimsgroup.com/?l=bugtraq&m=103962838628940&w=2
  +  [1] http://sunsite.dk/wget/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1344
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.1/UPD/wget-1.8.2-1.1.1.src.rpm
  +  [6] ftp://ftp.openpkg.org/release/1.1

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-01-22 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   22-Jan-2003 17:04:54
  Branch: HEAD Handle: 2003012216045301

  Added files:
openpkg-web/securityOpenPKG-SA-2003.006-python.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.006-python; CAN-2002-1119

  Summary:
RevisionChanges Path
1.14+1  -0  openpkg-web/security.txt
1.31+1  -0  openpkg-web/security.wml
1.1 +72 -0  openpkg-web/security/OpenPKG-SA-2003.006-python.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.13 -r1.14 security.txt
  --- openpkg-web/security.txt  22 Jan 2003 13:01:31 -  1.13
  +++ openpkg-web/security.txt  22 Jan 2003 16:04:53 -  1.14
  @@ -1,3 +1,4 @@
  +22-Jan-2003: Security Advisory: S
   22-Jan-2003: Security Advisory: S
   21-Jan-2003: Security Advisory: S
   21-Jan-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.30 -r1.31 security.wml
  --- openpkg-web/security.wml  22 Jan 2003 13:12:54 -  1.30
  +++ openpkg-web/security.wml  22 Jan 2003 16:04:53 -  1.31
  @@ -78,6 +78,7 @@
   
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.006-python.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.006-python.txt
  --- /dev/null 2003-01-22 17:04:54.0 +0100
  +++ OpenPKG-SA-2003.006-python.txt2003-01-22 17:04:54.0 +0100
  @@ -0,0 +1,72 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.006  23-Jan-2003
  +
  +
  +Package: python
  +Vulnerability:   predictable filename allows arbitrary code execution 
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= python-2.2.1-20020820>= python-2.2.2-20021015
  +OpenPKG 1.2  noneN.A.
  +OpenPKG 1.1  <= python-2.2.1-1.1.0   >= python-2.2.1-1.1.1
  +
  +Affected Releases:   Dependent Packages: none
  +
  +Description:
  +  Zack Weinberg discovered an insecure use of a hardcoded file name [0]
  +  in Python, a interpreted, interactive, object-oriented programming
  +  language [1]. Python uses a predictable filename which could lead to
  +  execution of arbitrary code.  The Common Vulnerabilities and Exposures
  +  (CVE) project assigned the id CAN-2002-1119 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  python". If you have the "python" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution) and it's dependent packages (see above), if any, too.
  +  [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5], fetch it from the OpenPKG FTP service [6] or a mirror location,
  +  verify its integrity [7], build a corresponding binary RPM from it [3]
  +  and update your OpenPKG installation by applying the binary RPM [4].
  +  For the release OpenPKG 1.1, perform the following operations to
  +  permanently fix the security problem (for other releases adjust
  +  accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.1/UPD
  +  ftp> get python-2.2.1-1.1.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig python-2.2.1-1.1.1.src.rpm
  +  $ /bin/rpm --rebuild python-2.2.1-1.1.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/python-2.2.1-1.1.1.*.rpm
  +
  +
  +References:
  +  [0] http://mail.python.org/pipermail/python-dev/2002-August/027223.html
  +  [1] http://www.python.org/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1119
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.1/UPD/python-2.2.1-1.1.1.src.r

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-01-22 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   22-Jan-2003 14:01:33
  Branch: HEAD Handle: 2003012213013101

  Added files:
openpkg-web/securityOpenPKG-SA-2003.005-php.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.005-php; CAN-2002-1396

  Summary:
RevisionChanges Path
1.13+1  -0  openpkg-web/security.txt
1.29+1  -0  openpkg-web/security.wml
1.1 +86 -0  openpkg-web/security/OpenPKG-SA-2003.005-php.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.12 -r1.13 security.txt
  --- openpkg-web/security.txt  21 Jan 2003 13:49:01 -  1.12
  +++ openpkg-web/security.txt  22 Jan 2003 13:01:31 -  1.13
  @@ -1,3 +1,4 @@
  +22-Jan-2003: Security Advisory: S
   21-Jan-2003: Security Advisory: S
   21-Jan-2003: Security Advisory: S
   16-Jan-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.28 -r1.29 security.wml
  --- openpkg-web/security.wml  21 Jan 2003 13:49:01 -  1.28
  +++ openpkg-web/security.wml  22 Jan 2003 13:01:31 -  1.29
  @@ -70,6 +70,7 @@
  TXT)
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.005-php.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.005-php.txt
  --- /dev/null 2003-01-22 14:01:33.0 +0100
  +++ OpenPKG-SA-2003.005-php.txt   2003-01-22 14:01:33.0 +0100
  @@ -0,0 +1,86 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.005  22-Jan-2003
  +
  +
  +Package: php
  +Vulnerability:   buffer overflow in "wordwrap" function
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= php-4.2.3-20020907   >= php-4.3.0-20021228
  +OpenPKG 1.2  none>= php-4.3.0-1.2.0
  +OpenPKG 1.1  <= php-4.2.2-1.1.0  >= php-4.2.2-1.1.1
  +OpenPKG 1.0  none>= php-4.0.6-1.0.1
  +
  +Affected Releases:   Dependent Packages:
  +OpenPKG CURRENT  <= apache-1.3.27-20021129   >= apache-1.3.27-20021228
  +OpenPKG 1.2  none>= apache-1.3.27-1.2.0
  +OpenPKG 1.1  <= apache-1.3.26-1.1.2  >= apache-1.3.26-1.1.3
  +OpenPKG 1.0  none>= apache-1.3.22-1.0.6
  +
  +Description:
  +  According to a bug report [0] from David F. Skoll
  +  <[EMAIL PROTECTED]> a buffer overflow problem exists in the
  +  "wordwrap" function of Personal HomePage (PHP) [1], a an HTML-embedded
  +  scripting language. Thanks to David's input and help the source of the
  +  problem was tracked down and corrected. The Common Vulnerabilities and
  +  Exposures (CVE) project assigned the id CAN-2002-1396 [2] to the
  +  problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  php". If you have the "php" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +  
  +  Also run "/bin/rpm -qi apache". If you have the "apache"
  +  package installed having the "with_mod_php" option set to "yes" and
  +  its version is affected (see above), we recommend that you immediately
  +  upgrade it (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5], fetch it from the OpenPKG FTP service [6] or a mirror
  +  location, verify its integrity [7], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the release OpenPKG 1.1, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.1/UPD
  +  ftp> get php-4.2.2-1.1.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig php-4.2

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-01-21 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   21-Jan-2003 14:49:02
  Branch: HEAD Handle: 2003012113490101

  Added files:
openpkg-web/securityOpenPKG-SA-2003.004-cvs.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.004-cvs; CAN-2003-0015

  Summary:
RevisionChanges Path
1.12+1  -0  openpkg-web/security.txt
1.28+1  -0  openpkg-web/security.wml
1.1 +76 -0  openpkg-web/security/OpenPKG-SA-2003.004-cvs.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.11 -r1.12 security.txt
  --- openpkg-web/security.txt  20 Jan 2003 20:11:47 -  1.11
  +++ openpkg-web/security.txt  21 Jan 2003 13:49:01 -  1.12
  @@ -1,3 +1,4 @@
  +21-Jan-2003: Security Advisory: S
   21-Jan-2003: Security Advisory: S
   16-Jan-2003: Security Advisory: S
   15-Jan-2003: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.27 -r1.28 security.wml
  --- openpkg-web/security.wml  20 Jan 2003 20:11:47 -  1.27
  +++ openpkg-web/security.wml  21 Jan 2003 13:49:01 -  1.28
  @@ -70,6 +70,7 @@
  TXT)
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.004-cvs.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.004-cvs.txt
  --- /dev/null 2003-01-21 14:49:02.0 +0100
  +++ OpenPKG-SA-2003.004-cvs.txt   2003-01-21 14:49:02.0 +0100
  @@ -0,0 +1,76 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.004  21-Jan-2003
  +
  +
  +Package: cvs
  +Vulnerability:   remote root compromise
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= cvs-1.11.4-20030114  >= cvs-1.11.5-20030121
  +OpenPKG 1.1  <= cvs-1.11.2-1.1.0 >= cvs-1.11.2-1.1.1
  +OpenPKG 1.0  <= cvs-1.11.1p1-1.0.1   >= cvs-1.11.1p1-1.0.2
  +
  +Affected Releases:   Dependent Packages: none
  +
  +Description:
  +  According to an e-matters Security Advisory [0] from Stefan Esser
  +  <[EMAIL PROTECTED]>, a vulnerability exists in the Concurrent
  +  Versions System (CVS) [1] which allows remote compromise of CVS
  +  servers.  The Common Vulnerabilities and Exposures (CVE) project
  +  assigned the id CAN-2003-0015 [2] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  cvs". If you have the "cvs" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade
  +  it (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.1, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.1/UPD
  +  ftp> get cvs-1.11.2-1.1.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig cvs-1.11.2-1.1.1.src.rpm
  +  $ /bin/rpm --rebuild cvs-1.11.2-1.1.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/cvs-1.11.2-1.1.1.*.rpm
  +
  +  Additionally, we recommend that you rebuild and reinstall
  +  all dependent packages (see above), if any, too. [3][4]
  +
  +
  +References:
  +  [0] http://security.e-matters.de/advisories/012003.html
  +  [1] http://www.cvshome.org/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0015
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.0/UPD/foo-1.2.0-1.0.1.src.rpm
  +  [6]

[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2003-01-20 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   20-Jan-2003 21:11:49
  Branch: HEAD Handle: 2003012020114701

  Added files:
openpkg-web/securityOpenPKG-SA-2003.003-vim.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2003.003-vim; CAN-2002-1377

  Summary:
RevisionChanges Path
1.11+1  -0  openpkg-web/security.txt
1.27+1  -0  openpkg-web/security.wml
1.1 +76 -0  openpkg-web/security/OpenPKG-SA-2003.003-vim.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.10 -r1.11 security.txt
  --- openpkg-web/security.txt  16 Jan 2003 13:35:12 -  1.10
  +++ openpkg-web/security.txt  20 Jan 2003 20:11:47 -  1.11
  @@ -1,3 +1,4 @@
  +21-Jan-2003: Security Advisory: S
   16-Jan-2003: Security Advisory: S
   15-Jan-2003: Security Advisory: S
   17-Dec-2002: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.26 -r1.27 security.wml
  --- openpkg-web/security.wml  16 Jan 2003 14:25:53 -  1.26
  +++ openpkg-web/security.wml  20 Jan 2003 20:11:47 -  1.27
  @@ -70,6 +70,7 @@
  TXT)
   
   
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.003-vim.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.003-vim.txt
  --- /dev/null 2003-01-20 21:11:48.0 +0100
  +++ OpenPKG-SA-2003.003-vim.txt   2003-01-20 21:11:49.0 +0100
  @@ -0,0 +1,76 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.003  21-Jan-2003
  +
  +
  +Package: vim
  +Vulnerability:   arbitrary command execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= vim-6.1.264-20021223 >= vim-6.1.266-20021224
  +OpenPKG 1.1  <= vim-6.1.165-1.1.0>= vim-6.1.165-1.1.1
  +OpenPKG 1.0  <= vim-6.0.92-1.0.1 >= vim-6.0.92-1.0.2
  +
  +Affected Releases:   Dependent Packages: none
  +
  +Description:
  +  According to a security advisory from Georgi Guninski [0] a
  +  vulnerability exists in the Vim (Vi Improved) text editor [1] which
  +  allows arbitrary command execution using the libcall feature in
  +  modelines.  The Common Vulnerabilities and Exposures (CVE) project
  +  assigned the id CAN-2002-1377 [2] to the problem. Both versions 6.0
  +  and 6.1 are affected.  The necessary patch was incorporated into the
  +  6.1 source tree beginning with patchlevel 265. We have backported the
  +  patch to the 6.0.92 and 6.1.165 releases.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q vim". If you have the "vim" package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade
  +  it (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.1, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.1/UPD
  +  ftp> get vim-6.1.165-1.1.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig vim-6.1.165-1.1.1.src.rpm
  +  $ /bin/rpm --rebuild vim-6.1.165-1.1.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/1.1.*.rpm
  +
  +
  +References:
  +  [0] http://www.guninski.com/vim1.html
  +  [1] http://www.vim.org/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1377
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp