OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall
Root: /e/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-web Date: 20-Mar-2003 17:32:13
Branch: HEAD Handle: 2003032016321200
Modified files:
openpkg-web/security OpenPKG-SA-2003.025-mutt.txt page.pl
Log:
final polishing and signing Mutt SA
Summary:
Revision Changes Path
1.2 +17 -7 openpkg-web/security/OpenPKG-SA-2003.025-mutt.txt
1.9 +1 -1 openpkg-web/security/page.pl
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-web/security/OpenPKG-SA-2003.025-mutt.txt
============================================================================
$ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.025-mutt.txt
--- openpkg-web/security/OpenPKG-SA-2003.025-mutt.txt 20 Mar 2003 15:14:35 -0000
1.1
+++ openpkg-web/security/OpenPKG-SA-2003.025-mutt.txt 20 Mar 2003 16:32:12 -0000
1.2
@@ -1,3 +1,6 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
________________________________________________________________________
OpenPKG Security Advisory The OpenPKG Project
@@ -10,17 +13,17 @@
Vulnerability: buffer overflow in IMAP client
OpenPKG Specific: no
-Affected Releases: Affected Packages: Corrected Packages:
-OpenPKG CURRENT <= mutt-1.4i-20030103 >= mutt-1.4.1i-20030320
-OpenPKG 1.2 <= mutt-1.4i-1.2.0 >= mutt-1.4i-1.2.1
-OpenPKG 1.1 <= mutt-1.4i-1.1.0 >= mutt-1.4i-1.1.1
+Affected Releases: Affected Packages: Corrected Packages:
+OpenPKG CURRENT <= mutt-1.4i-20030103 >= mutt-1.4.1i-20030320
+OpenPKG 1.2 <= mutt-1.4i-1.2.0 >= mutt-1.4i-1.2.1
+OpenPKG 1.1 <= mutt-1.4i-1.1.0 >= mutt-1.4i-1.1.1
Dependent Packages: none
Description:
- According to a posting on Bugtraq [0] Edmund Grimley Evans fixed a
- buffer overflow which exists in the IMAP client code of mutt [1]. The
- bug was found by Core Security Technologies [2].
+ According to a posting on Bugtraq [0], Edmund Grimley Evans fixed a
+ buffer overflow which exists in the IMAP client code of the mail user
+ agent Mutt [1]. The bug was found by Core Security Technologies [2].
Please check whether you are affected by running "<prefix>/bin/rpm -q
mutt". If you have the "mutt" package installed and its version is
@@ -69,3 +72,10 @@
the command "gpg --verify --keyserver keyserver.pgp.com".
________________________________________________________________________
+-----BEGIN PGP SIGNATURE-----
+Comment: OpenPKG <[EMAIL PROTECTED]>
+
+iD8DBQE+eeyKgHWT4GPEy58RArpCAKDcaOeLoSA5Z9OvQ0U/vT38ZXi4wwCg1ZNF
+M+mSz6l/Oi9I43eNw8wB4s4=
+=r1SF
+-----END PGP SIGNATURE-----
@@ .
patch -p0 <<'@@ .'
Index: openpkg-web/security/page.pl
============================================================================
$ cvs diff -u -r1.8 -r1.9 page.pl
--- openpkg-web/security/page.pl 19 Mar 2003 14:53:07 -0000 1.8
+++ openpkg-web/security/page.pl 20 Mar 2003 16:32:12 -0000 1.9
@@ -12,7 +12,7 @@
foreach my $sa (reverse sort @SA) {
my ($base, $name) = ($sa =~ m|^(OpenPKG-SA-(.+))\.txt$|);
next if ($name =~ m|^0000|);
- next if ($name =~ m|^2003\.02[5-9]|);
+ next if ($name =~ m|^2003\.02[6-9]|);
$sidebar .= "<a href=\"$base.html\">$name</a><br>";
}
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]