OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Michael Schloh
Root: /e/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-web Date: 09-Apr-2003 17:08:40
Branch: HEAD Handle: 2003040916083900
Modified files:
openpkg-web/security OpenPKG-SA-0000.000-template.txt
Log:
Incorporate suggestions by Thomas LOTTERER.
Summary:
Revision Changes Path
1.11 +17 -12 openpkg-web/security/OpenPKG-SA-0000.000-template.txt
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-web/security/OpenPKG-SA-0000.000-template.txt
============================================================================
$ cvs diff -u -r1.10 -r1.11 OpenPKG-SA-0000.000-template.txt
--- openpkg-web/security/OpenPKG-SA-0000.000-template.txt 30 Mar 2003 11:26:38
-0000 1.10
+++ openpkg-web/security/OpenPKG-SA-0000.000-template.txt 9 Apr 2003 15:08:39
-0000 1.11
@@ -34,9 +34,13 @@
too. [3][4]
Solution:
+ First, please avoid applying an obsolete security update by ensuring
+ that a more recent one doesn't exist. Also, ensure that this advisory
+ has not been revoked by visiting the OpenPKG security page [5].
+
Select the updated source RPM appropriate for your OpenPKG release
- [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
- location, verify its integrity [9], build a corresponding binary RPM
+ [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror
+ location, verify its integrity [10], build a corresponding binary RPM
from it [3] and update your OpenPKG installation by applying the binary
RPM [4]. For the current release OpenPKG 1.2, perform the following
operations to permanently fix the security problem (for other releases
@@ -57,16 +61,17 @@
________________________________________________________________________
References:
- [0] http://www.example.com/bugfinder.html
- [1] http://www.foo.org/
- [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-...
- [3] http://www.openpkg.org/tutorial.html#regular-source
- [4] http://www.openpkg.org/tutorial.html#regular-binary
- [5] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm
- [6] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm
- [7] ftp://ftp.openpkg.org/release/1.1/UPD/
- [8] ftp://ftp.openpkg.org/release/1.2/UPD/
- [9] http://www.openpkg.org/security.html#signature
+ [0] http://www.example.com/bugfinder.html
+ [1] http://www.foo.org/
+ [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-...
+ [3] http://www.openpkg.org/tutorial.html#regular-source
+ [4] http://www.openpkg.org/tutorial.html#regular-binary
+ [5] http://www.openpkg.org/security.html#revoked
+ [6] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm
+ [7] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm
+ [8] ftp://ftp.openpkg.org/release/1.1/UPD/
+ [9] ftp://ftp.openpkg.org/release/1.2/UPD/
+ [10] http://www.openpkg.org/security.html#signature
________________________________________________________________________
For security reasons, this advisory was digitally signed with the
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]