OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   10-Jun-2005 20:29:57
  Branch: HEAD                             Handle: 2005061019295700

  Modified files:
    openpkg-web/security    OpenPKG-SA-2005.010-openpkg.txt

  Log:
    small cosmetics, including par(1) formatting

  Summary:
    Revision    Changes     Path
    1.2         +19 -18     openpkg-web/security/OpenPKG-SA-2005.010-openpkg.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2005.010-openpkg.txt
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2005.010-openpkg.txt
  --- openpkg-web/security/OpenPKG-SA-2005.010-openpkg.txt      10 Jun 2005 
13:37:17 -0000      1.1
  +++ openpkg-web/security/OpenPKG-SA-2005.010-openpkg.txt      10 Jun 2005 
18:29:57 -0000      1.2
  @@ -3,7 +3,7 @@
   OpenPKG Security Advisory                            The OpenPKG Project
   http://www.openpkg.org/security.html              http://www.openpkg.org
   [EMAIL PROTECTED]                         [EMAIL PROTECTED]
  -OpenPKG-SA-2005.010                                         10-June-2005
  +OpenPKG-SA-2005.010                                          10-Jun-2005
   ________________________________________________________________________
   
   Package:             openpkg
  @@ -20,38 +20,39 @@
   Dependent Packages:  none
   
   Description:
  -  The vulnerabilities described by this text affect the openpkg
  -  bootstrap package's gzip and bzip2 embedded software. Similar
  -  advisories [0][1] describe the same vulnerabilities, although
  -  in context of the particular vendor software.
  +  The vulnerabilities described by this text affect the OpenPKG
  +  bootstrap package's GZip and BZip2 embedded software. Similar
  +  advisories [0][1] describe the same vulnerabilities, although in
  +  context of the particular vendor software.
   
  -  According to a Debian bug report [2], Ulf Harnhammar discovered
  -  an input validation error in the gzip data compressor [3]. Because
  +  According to a Debian bug report [2], Ulf Harnhammar discovered an
  +  input validation error in the GZip data compressor [3]. Because
     gzip(1) fails to properly validate file paths during decompression
     with the "-N" argument, a remote attacker using a malicious archive
     could corrupt arbitrary files with the privileges of the user that
     is running gzip(1). The Common Vulnerabilities and Exposures (CVE)
     project assigned the identifier CAN-2005-1228 [4] to this problem.
   
  -  According to a BugTraq posting [5], Imran Ghory discovered a time of
  -  check time of use (TOCTOU) file mode vulnerability in the bzip2 data
  -  compressor [6]. Because bzip2(1) does not safely restore the mode of
  -  a file undergoing compression or decompression, a malicious user can
  -  potentially change the mode of any file belonging to the user running
  -  bzip2(1). The Common Vulnerabilities and Exposures (CVE) project
  -  assigned the identifier CAN-2005-0953 [7] to this problem.
  +  According to a BugTraq posting [5], Imran Ghory discovered a time
  +  of check time of use (TOCTOU) file mode vulnerability in the BZip2
  +  data compressor [6]. Because bzip2(1) does not safely restore the
  +  mode of a file undergoing compression or decompression, a malicious
  +  user can potentially change the mode of any file belonging to the
  +  user running bzip2(1). The Common Vulnerabilities and Exposures (CVE)
  +  project assigned the identifier CAN-2005-0953 [7] to this problem.
   
  -  In a unrelated bzip2 problem, a denial of service vulnerability
  +  In a unrelated BZip2 problem, a denial of service vulnerability
     was found in both the bzip2(1) program and its associated library
  -  libbz2(3). Specially crafted bzip2 archives lead to an infinite loop
  +  libbz2(3). Specially crafted BZip2 archives lead to an infinite loop
     in the decompressor which results in an indefinitively large output
     file. This could be exploited to cause disk space exhaustion. The
     Common Vulnerabilities and Exposures (CVE) project assigned the
     identifier CAN-2005-1260 [8] to this problem.
   
     Please check whether you are affected by running "<prefix>/bin/openpkg
  -  rpm -q openpkg". If the openpkg package version is affected (see above),
  -  we recommend that you immediately upgrade it (see Solution) [9][10].
  +  rpm -q openpkg". If the openpkg package version is affected (see
  +  above), we recommend that you immediately upgrade it (see Solution)
  +  [9][10].
   
   Solution:
     Select the updated source RPM appropriate for your OpenPKG release
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [email protected]

Reply via email to