OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   10-Jun-2005 20:26:54
  Branch: HEAD                             Handle: 2005061019265400

  Modified files:
    openpkg-web/security    OpenPKG-SA-2005.008-bzip2.txt

  Log:
    cosmetics again

  Summary:
    Revision    Changes     Path
    1.4         +15 -14     openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt
  ============================================================================
  $ cvs diff -u -r1.3 -r1.4 OpenPKG-SA-2005.008-bzip2.txt
  --- openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt        10 Jun 2005 
13:28:42 -0000      1.3
  +++ openpkg-web/security/OpenPKG-SA-2005.008-bzip2.txt        10 Jun 2005 
18:26:54 -0000      1.4
  @@ -3,7 +3,7 @@
   OpenPKG Security Advisory                            The OpenPKG Project
   http://www.openpkg.org/security.html              http://www.openpkg.org
   [EMAIL PROTECTED]                         [EMAIL PROTECTED]
  -OpenPKG-SA-2005.008                                         10-June-2005
  +OpenPKG-SA-2005.008                                          10-Jun-2005
   ________________________________________________________________________
   
   Package:             bzip2
  @@ -28,24 +28,24 @@
                        perl-comp perl-mail php::with_bzip2
   
   Description:
  -  According to a BugTraq posting [0], Imran Ghory discovered a time of
  -  check time of use (TOCTOU) file mode vulnerability in the bzip2 data
  -  compressor [1]. Because bzip2(1) does not safely restore the mode of
  -  a file undergoing compression or decompression, a malicious user can
  -  potentially change the mode of any file belonging to the user running
  -  bzip2(1). The Common Vulnerabilities and Exposures (CVE) project
  -  assigned the identifier CAN-2005-0953 [2] to this problem.
  +  According to a BugTraq posting [0], Imran Ghory discovered a time
  +  of check time of use (TOCTOU) file mode vulnerability in the BZip2
  +  data compressor [1]. Because bzip2(1) does not safely restore the
  +  mode of a file undergoing compression or decompression, a malicious
  +  user can potentially change the mode of any file belonging to the
  +  user running bzip2(1). The Common Vulnerabilities and Exposures (CVE)
  +  project assigned the identifier CAN-2005-0953 [2] to this problem.
   
     In a unrelated case, a denial of service vulnerability was found
     in both the bzip2(1) program and its associated library libbz2(3).
  -  Specially crafted bzip2 archives lead to an infinite loop in the
  +  Specially crafted BZip2 archives lead to an infinite loop in the
     decompressor which results in an indefinitively large output file.
     This could be exploited to cause disk space exhaustion. The Common
     Vulnerabilities and Exposures (CVE) project assigned the identifier
     CAN-2005-1260 [3] to this problem.
   
  -  Because the openpkg bootstrap package embeds bzip2, it may be affected
  -  as well. Please refer to OpenPKG-SA-2005.010-openpkg for details [4].
  +  Because the OpenPKG bootstrap package embeds BZip2, it is affected as
  +  well. Please refer to OpenPKG-SA-2005.010-openpkg for details [4].
   
     Please check whether you are affected by running "<prefix>/bin/openpkg
     rpm -q bzip2". If you have the "bzip2" package installed and its
  @@ -72,13 +72,14 @@
     # <prefix>/bin/openpkg rpm -Fvh <prefix>/RPM/PKG/bzip2-1.0.2-2.3.1.*.rpm
   
     We recommend that you rebuild and reinstall any dependent packages
  -  (see above) as well [5][6]. The openpkg build tool can be instrumental
  -  in consistently updating and securing the entire OpenPKG instance.
  +  (see above) as well [5][6]. The "openpkg build" tool can be
  +  instrumental in consistently updating and securing the entire OpenPKG
  +  instance.
   ________________________________________________________________________
   
   References:
     [0]  http://marc.theaimsgroup.com/?l=bugtraq&m=111229375217633
  -  [1]  http://sources.redhat.com/bzip2/
  +  [1]  http://www.bzip.org/
     [2]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0953
     [3]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1260
     [4]  http://www.openpkg.org/security/OpenPKG-SA-2005.010-openpkg.html
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [email protected]

Reply via email to