OpenPKG CVS Repository
  http://www.openpkg.org/cvsweb/cvsweb.cgi
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   02-Aug-2002 16:03:43
  Branch: HEAD                             Handle: 2002080215034300

  Added files:
    openpkg-web/security    OpenPKG-SA-2002.007-mm.txt
                            OpenPKG-SA-2002.008-openssl.txt
  Modified files:
    openpkg-web/security    OpenPKG-SA-2002.006-bind.txt

  Log:
    commit security advisories to CVS

  Summary:
    Revision    Changes     Path
    1.2         +10 -0      openpkg-web/security/OpenPKG-SA-2002.006-bind.txt
    1.1         +85 -0      openpkg-web/security/OpenPKG-SA-2002.007-mm.txt
    1.1         +120 -0     openpkg-web/security/OpenPKG-SA-2002.008-openssl.txt
  ____________________________________________________________________________

  Index: openpkg-web/security/OpenPKG-SA-2002.006-bind.txt
  ============================================================
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2002.006-bind.txt
  --- openpkg-web/security/OpenPKG-SA-2002.006-bind.txt 4 Jul 2002 13:48:22 -0000      
 1.1
  +++ openpkg-web/security/OpenPKG-SA-2002.006-bind.txt 2 Aug 2002 14:03:43 -0000      
 1.2
  @@ -1,3 +1,6 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
  +
   ________________________________________________________________________
   
   OpenPKG Security Advisory                            The OpenPKG Project 
  @@ -84,3 +87,10 @@
   the command "gpg --verify --keyserver keyserver.pgp.com".
   ________________________________________________________________________
   
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iEYEARECAAYFAj0kV/0ACgkQgHWT4GPEy5947gCeMeR04Bag/GP3Oo7CzJxyHx2n
  +RwkAnA5vN0nnuPNEZ7uiFFhgG07o2w0k
  +=fugf
  +-----END PGP SIGNATURE-----
  Index: openpkg-web/security/OpenPKG-SA-2002.007-mm.txt
  ============================================================
  $ cvs update -p -r1.1 OpenPKG-SA-2002.007-mm.txt
  -----BEGIN PGP SIGNED MESSAGE-----
  Hash: SHA1
  
  ________________________________________________________________________
  
  OpenPKG Security Advisory                            The OpenPKG Project 
  http://www.openpkg.org/security.html              http://www.openpkg.org
  [EMAIL PROTECTED]                         [EMAIL PROTECTED]             
    
  OpenPKG-SA-2002.007                                          30-Jul-2002
  ________________________________________________________________________
  
  Package:             mm
  Vulnerability:       local root exploit
  OpenPKG Specific:    no
  
  Affected  Releases:  OpenPKG 1.0         OpenPKG CURRENT
  Affected  Packages:  <= mm-1.1.3-1.0.0   <= mm-1.1.3
  Corrected Packages:  >= mm-1.1.3-1.0.1   >= mm-1.2.0
  Dependent Packages:  apache              apache
  
  Description:
    Marcus Meissner and Sebastian Krahmer discovered a race condition
    on creating temporary files in the OSSP mm library. The Common
    Vulnerabilities and Exposures (CVE) project assigned the id
    CAN-2002-0658 [5] to the problem. The bug affects all programs which
    are linked with OSSP mm. This may allow an attacker to conduct a local
    root exploit. OSSP mm is often used in Apache setups using mod_ssl
    and/or mod_php. Here the vulnerability can be exploited to obtain
    root privilege if shell access to the Apache run-time user is already
    obtained.
  
    Please check whether you are affected by running "<prefix>/bin/rpm
    -q mm". If you have the "mm" package installed and its version is
    affected (see above), we recommend that you immediately upgrade it
    (see Solution). Additionally, we recommend that you rebuild and
    reinstall all dependent OpenPKG packages, too. [2]
  
  Solution:
    Select the updated source RPM appropriate for your OpenPKG release
    [4], fetch it from the OpenPKG FTP service [3] or a mirror location,
    verify its integrity [1], build a corresponding binary RPM from it
    and update your OpenPKG installation by applying the binary RPM [2].
    For the latest OpenPKG 1.0 release, perform the following operations
    to permanently fix the security problem (for other releases adjust
    accordingly).
  
    $ ftp ftp.openpkg.org
    ftp> bin
    ftp> cd release/1.0/UPD
    ftp> get mm-1.1.3-1.0.1.src.rpm
    ftp> bye
    $ <prefix>/bin/rpm --checksig mm-1.1.3-1.0.1.src.rpm
    $ <prefix>/bin/rpm --rebuild mm-1.1.3-1.0.1.src.rpm
    $ su -
    # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/mm-1.1.3-1.0.1.*.rpm
  
    Now proceed and rebuild and reinstall all dependent OpenPKG packages,
    too. [6]
  ________________________________________________________________________
  
  References:
    [1]  http://www.openpkg.org/security.html#signature
    [2]  http://www.openpkg.org/tutorial.html#regular-source
    [3]  ftp://ftp.openpkg.org/release/1.0/UPD/
    [4]  ftp://ftp.openpkg.org/release/1.0/UPD/mm-1.1.3-1.0.1.src.rpm
    [5]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0658
    [6]  ftp://ftp.openpkg.org/release/1.0/UPD/apache-1.3.22-1.0.4.src.rpm
  ________________________________________________________________________
  
  For security reasons, this advisory was digitally signed with
  the OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F)
  of the OpenPKG project which you can find under the official URL
  http://www.openpkg.org/openpkg.pgp or on http://keyserver.pgp.com/. To
  check the integrity of this advisory, verify its digital signature by
  using GnuPG (http://www.gnupg.org/). For instance, pipe this message to
  the command "gpg --verify --keyserver keyserver.pgp.com".
  ________________________________________________________________________
  
  -----BEGIN PGP SIGNATURE-----
  Comment: OpenPKG <[EMAIL PROTECTED]>
  
  iEYEARECAAYFAj1GjiIACgkQgHWT4GPEy5+dRwCdGCpZ3TCpxh39dB0ZgbieXvLd
  QiQAoOUJCijAwnAaHGdf/cVC3RhFDISy
  =LA85
  -----END PGP SIGNATURE-----
  Index: openpkg-web/security/OpenPKG-SA-2002.008-openssl.txt
  ============================================================
  $ cvs update -p -r1.1 OpenPKG-SA-2002.008-openssl.txt
  -----BEGIN PGP SIGNED MESSAGE-----
  Hash: SHA1
  
  ________________________________________________________________________
  
  OpenPKG Security Advisory                            The OpenPKG Project 
  http://www.openpkg.org/security.html              http://www.openpkg.org
  [EMAIL PROTECTED]                         [EMAIL PROTECTED]             
    
  OpenPKG-SA-2002.008                                          30-Jul-2002
  ________________________________________________________________________
  
  Package:             openssl
  Vulnerability:       denial of service / remote root exploit
  OpenPKG Specific:    no
  
  Affected  Releases:  OpenPKG 1.0               OpenPKG CURRENT
  Affected  Packages:  <= openssl-0.9.6b-1.0.0   <= openssl-0.9.6d
  Corrected Packages:  >= openssl-0.9.6b-1.0.1   >= openssl-0.9.6e
  Dependent Packages:  apache                    apache
                       curl                      bind   
                       fetchmail                 cadaver
                       imapd                     cpu    
                       inn                       curl
                       links                     dsniff 
                       lynx                      exim   
                       mutt                      fetchmail
                       openldap                  imapd
                       openssh                   inn
                       perl-ssl                  links
                       postfix                   lynx
                       postgresql                mutt
                       qpopper                   neon
                       samba                     openldap
                       sasl                      openssh
                       scanssh                   openvpn
                       sendmail                  perl-ssl
                       siege                     postfix
                       sitecopy                  postgresql
                       snmp                      qpopper
                       stunnel                   rdesktop
                       tcpdump                   samba
                       w3m                       sasl
                                                 scanssh
                                                 sendmail
                                                 siege
                                                 sitecopy
                                                 snmp
                                                 stunnel
                                                 sysmon
                                                 tcpdump
                                                 w3m
  
  Description:
    According to an official security advisory from the OpenSSL team,
    there are four remotely exploitable buffer overflows that affect
    various OpenSSL client and server implementations [5]. There are
    also parsing problems in the ASN.1 library used by OpenSSL. The
    Common Vulnerabilities and Exposures (CVE) project assigned the
    ids CAN-2002-0655 [6], CAN-2002-0656 [7], CAN-2002-0657 [8] and
    CAN-2002-0659 [9] to the problems. Several of these vulnerabilities
    could be used by a remote attacker to execute arbitrary code on the
    target system. All could be used to create a denial of service.
  
    Please check whether you are affected by running "<prefix>/bin/rpm -q
    openssl". If you have the "openssl" package installed and its version
    is affected (see above), we recommend that you immediately upgrade it
    (see Solution). Additionally, you have to rebuild and reinstall all
    dependent OpenPKG packages, too. [2]
  
  Solution:
    Select the updated source RPM appropriate for your OpenPKG release
    [4], fetch it from the OpenPKG FTP service [3] or a mirror location,
    verify its integrity [1], build a corresponding binary RPM from it
    and update your OpenPKG installation by applying the binary RPM [2].
    For the latest OpenPKG 1.0 release, perform the following operations
    to permanently fix the security problem (for other releases adjust
    accordingly).
  
    $ ftp ftp.openpkg.org
    ftp> bin
    ftp> cd release/1.0/UPD
    ftp> get openssl-0.9.6b-1.0.1.src.rpm
    ftp> bye
    $ <prefix>/bin/rpm --checksig openssl-0.9.6b-1.0.1.src.rpm
    $ <prefix>/bin/rpm --rebuild openssl-0.9.6b-1.0.1.src.rpm
    $ su -
    # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/openssl-0.9.6b-1.0.1.*.rpm
  
    Now proceed and rebuild and reinstall all dependent OpenPKG packages,
    too (see list above).
  ________________________________________________________________________
  
  References:
    [1]  http://www.openpkg.org/security.html#signature
    [2]  http://www.openpkg.org/tutorial.html#regular-source
    [3]  ftp://ftp.openpkg.org/release/1.0/UPD/
    [4]  ftp://ftp.openpkg.org/release/1.0/UPD/openssl-0.9.6b-1.0.1.src.rpm
    [5]  http://www.openssl.org/news/secadv_20020730.txt
    [6]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655
    [7]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656
    [8]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657
    [9]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659
  ________________________________________________________________________
  
  For security reasons, this advisory was digitally signed with
  the OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F)
  of the OpenPKG project which you can find under the official URL
  http://www.openpkg.org/openpkg.pgp or on http://keyserver.pgp.com/. To
  check the integrity of this advisory, verify its digital signature by
  using GnuPG (http://www.gnupg.org/). For instance, pipe this message to
  the command "gpg --verify --keyserver keyserver.pgp.com".
  ________________________________________________________________________
  
  -----BEGIN PGP SIGNATURE-----
  Comment: OpenPKG <[EMAIL PROTECTED]>
  
  iEYEARECAAYFAj1GjigACgkQgHWT4GPEy5+F4wCgu8B6yxJsB6Lu7bygw9FKUAhH
  4xsAoKTteo/qotFgoki3JYpuGufyp4vL
  =k9ol
  -----END PGP SIGNATURE-----
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to