OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall
Root: /e/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-web Date: 03-Jun-2003 15:48:16
Branch: HEAD Handle: 2003060314481600
Modified files:
openpkg-web/security OpenPKG-SA-0000.000-template.txt
Log:
back out change until we really have such a revoke functionality
Summary:
Revision Changes Path
1.12 +12 -17 openpkg-web/security/OpenPKG-SA-0000.000-template.txt
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-web/security/OpenPKG-SA-0000.000-template.txt
============================================================================
$ cvs diff -u -r1.11 -r1.12 OpenPKG-SA-0000.000-template.txt
--- openpkg-web/security/OpenPKG-SA-0000.000-template.txt 9 Apr 2003 15:08:39
-0000 1.11
+++ openpkg-web/security/OpenPKG-SA-0000.000-template.txt 3 Jun 2003 13:48:16
-0000 1.12
@@ -34,13 +34,9 @@
too. [3][4]
Solution:
- First, please avoid applying an obsolete security update by ensuring
- that a more recent one doesn't exist. Also, ensure that this advisory
- has not been revoked by visiting the OpenPKG security page [5].
-
Select the updated source RPM appropriate for your OpenPKG release
- [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror
- location, verify its integrity [10], build a corresponding binary RPM
+ [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
+ location, verify its integrity [9], build a corresponding binary RPM
from it [3] and update your OpenPKG installation by applying the binary
RPM [4]. For the current release OpenPKG 1.2, perform the following
operations to permanently fix the security problem (for other releases
@@ -61,17 +57,16 @@
________________________________________________________________________
References:
- [0] http://www.example.com/bugfinder.html
- [1] http://www.foo.org/
- [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-...
- [3] http://www.openpkg.org/tutorial.html#regular-source
- [4] http://www.openpkg.org/tutorial.html#regular-binary
- [5] http://www.openpkg.org/security.html#revoked
- [6] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm
- [7] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm
- [8] ftp://ftp.openpkg.org/release/1.1/UPD/
- [9] ftp://ftp.openpkg.org/release/1.2/UPD/
- [10] http://www.openpkg.org/security.html#signature
+ [0] http://www.example.com/bugfinder.html
+ [1] http://www.foo.org/
+ [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-...
+ [3] http://www.openpkg.org/tutorial.html#regular-source
+ [4] http://www.openpkg.org/tutorial.html#regular-binary
+ [5] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm
+ [6] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm
+ [7] ftp://ftp.openpkg.org/release/1.1/UPD/
+ [8] ftp://ftp.openpkg.org/release/1.2/UPD/
+ [9] http://www.openpkg.org/security.html#signature
________________________________________________________________________
For security reasons, this advisory was digitally signed with the
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]