OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall
Root: /e/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-web Date: 23-Jan-2003 15:35:26
Branch: HEAD Handle: 2003012314352500
Modified files:
openpkg-web/security OpenPKG-SA-2003.007-wget.txt
Log:
final polishing and signing of wget SA
Summary:
Revision Changes Path
1.3 +15 -4 openpkg-web/security/OpenPKG-SA-2003.007-wget.txt
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-web/security/OpenPKG-SA-2003.007-wget.txt
============================================================================
$ cvs diff -u -r1.2 -r1.3 OpenPKG-SA-2003.007-wget.txt
--- openpkg-web/security/OpenPKG-SA-2003.007-wget.txt 23 Jan 2003 14:08:02 -0000
1.2
+++ openpkg-web/security/OpenPKG-SA-2003.007-wget.txt 23 Jan 2003 14:35:25 -0000
1.3
@@ -1,3 +1,6 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
________________________________________________________________________
OpenPKG Security Advisory The OpenPKG Project
@@ -20,10 +23,11 @@
Description:
According to research done by Steve Christey [0], directory traversal
vulnerabilities exist in many FTP clients including wget [1].
- Resolution of this issue was handled primarily through Mark Cox of Red
- Hat whose patches were incorporated into the wget 1.8.2 HEAD
- development branch. The Common Vulnerabilities and Exposures (CVE)
- project assigned the id CAN-2002-1344 [2] to the problem.
+ Resolution of this issue was handled primarily through Mark Cox of
+ Red Hat whose patches were incorporated into the wget 1.8.2 HEAD
+ development branch of the vendor. The Common Vulnerabilities and
+ Exposures (CVE) project assigned the id CAN-2002-1344 [2] to the
+ problem.
Please check whether you are affected by running "<prefix>/bin/rpm -q
wget". If you have the "wget" package installed and its version is
@@ -70,3 +74,10 @@
the command "gpg --verify --keyserver keyserver.pgp.com".
________________________________________________________________________
+-----BEGIN PGP SIGNATURE-----
+Comment: OpenPKG <[EMAIL PROTECTED]>
+
+iD8DBQE+L/1tgHWT4GPEy58RAkSaAKCFkDghupTl/uAchoMWTLOfbhx6/QCcD08v
+9+6wRt4YmmvQUQBcpstM2vM=
+=/Zek
+-----END PGP SIGNATURE-----
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]