OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 22-Jan-2003 14:02:51 Branch: HEAD Handle: 2003012213025000 Modified files: openpkg-web/security OpenPKG-SA-0000.000-template.txt Log: migrate template from 1.1/1.0 to 1.2/1.1; drop 1.0 Summary: Revision Changes Path 1.9 +13 -13 openpkg-web/security/OpenPKG-SA-0000.000-template.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-0000.000-template.txt ============================================================================ $ cvs diff -u -r1.8 -r1.9 OpenPKG-SA-0000.000-template.txt --- openpkg-web/security/OpenPKG-SA-0000.000-template.txt 16 Jan 2003 13:53:34 -0000 1.8 +++ openpkg-web/security/OpenPKG-SA-0000.000-template.txt 22 Jan 2003 13:02:50 -0000 1.9 @@ -12,13 +12,13 @@ Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT <= foo-1.2.5-20021003 >= foo-1.2.5-20030115 +OpenPKG 1.2 <= foo-1.2.4-1.2.0 >= foo-1.2.4-1.2.1 OpenPKG 1.1 <= foo-1.2.4-1.1.0 >= foo-1.2.4-1.1.1 -OpenPKG 1.0 <= foo-1.2.0-1.0.0 >= foo-1.2.0-1.0.1 Affected Releases: Dependent Packages: OpenPKG CURRENT bar quux -OpenPKG 1.1 bar quux -OpenPKG 1.0 bar +OpenPKG 1.2 bar quux +OpenPKG 1.1 bar Description: According to a ... security advisory based on hints from ... @@ -38,19 +38,19 @@ [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror location, verify its integrity [9], build a corresponding binary RPM from it [3] and update your OpenPKG installation by applying the binary - RPM [4]. For the current release OpenPKG 1.1, perform the following + RPM [4]. For the current release OpenPKG 1.2, perform the following operations to permanently fix the security problem (for other releases adjust accordingly). $ ftp ftp.openpkg.org ftp> bin - ftp> cd release/1.1/UPD - ftp> get foo-1.2.4-1.1.1.src.rpm + ftp> cd release/1.2/UPD + ftp> get foo-1.2.4-1.2.1.src.rpm ftp> bye - $ <prefix>/bin/rpm -v --checksig foo-1.2.4-1.1.1.src.rpm - $ <prefix>/bin/rpm --rebuild foo-1.2.4-1.1.1.src.rpm + $ <prefix>/bin/rpm -v --checksig foo-1.2.4-1.2.1.src.rpm + $ <prefix>/bin/rpm --rebuild foo-1.2.4-1.2.1.src.rpm $ su - - # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/foo-1.2.4-1.1.1.*.rpm + # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/foo-1.2.4-1.2.1.*.rpm Additionally, we recommend that you rebuild and reinstall all dependent packages (see above), if any, too. [3][4] @@ -62,10 +62,10 @@ [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-... [3] http://www.openpkg.org/tutorial.html#regular-source [4] http://www.openpkg.org/tutorial.html#regular-binary - [5] ftp://ftp.openpkg.org/release/1.0/UPD/foo-1.2.0-1.0.1.src.rpm - [6] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.4-1.1.1.src.rpm - [7] ftp://ftp.openpkg.org/release/1.0/UPD/ - [8] ftp://ftp.openpkg.org/release/1.1/UPD/ + [5] ftp://ftp.openpkg.org/release/1.1/UPD/foo-1.2.0-1.1.1.src.rpm + [6] ftp://ftp.openpkg.org/release/1.2/UPD/foo-1.2.4-1.2.1.src.rpm + [7] ftp://ftp.openpkg.org/release/1.1/UPD/ + [8] ftp://ftp.openpkg.org/release/1.2/UPD/ [9] http://www.openpkg.org/security.html#signature ________________________________________________________________________ @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]