OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   06-Aug-2003 17:52:44
  Branch: HEAD                             Handle: 2003080616524400

  Modified files:
    openpkg-web/security    00README OpenPKG-SA-2003.036-perl-www.txt page.pl

  Log:
    finalize perl-www SA

  Summary:
    Revision    Changes     Path
    1.9         +1  -1      openpkg-web/security/00README
    1.2         +20 -9      openpkg-web/security/OpenPKG-SA-2003.036-perl-www.txt
    1.22        +1  -1      openpkg-web/security/page.pl
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/00README
  ============================================================================
  $ cvs diff -u -r1.8 -r1.9 00README
  --- openpkg-web/security/00README     6 Aug 2003 13:37:34 -0000       1.8
  +++ openpkg-web/security/00README     6 Aug 2003 15:52:44 -0000       1.9
  @@ -3,7 +3,7 @@
   $ mv OpenPKG-SA-2003.00x-xxx.txt.asc OpenPKG-SA-2003.00x-xxx.txt
   $ gpg --verify OpenPKG-SA-2003.00x-xxx.txt
   $ mutt [EMAIL PROTECTED]
  -  Subject: [OpenPKG-SA-2003.034] OpenPKG Security Advisory (imagemagick)
  +  Subject: [OpenPKG-SA-2003.035] OpenPKG Security Advisory (openssh)
     Approved: OPENPKG
   $ mutt [EMAIL PROTECTED]
     Subject: [OpenPKG-SA-2003.00x] OpenPKG Security Advisory (xxx)
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.036-perl-www.txt
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.036-perl-www.txt
  --- openpkg-web/security/OpenPKG-SA-2003.036-perl-www.txt     6 Aug 2003 15:26:43 
-0000       1.1
  +++ openpkg-web/security/OpenPKG-SA-2003.036-perl-www.txt     6 Aug 2003 15:52:44 
-0000       1.2
  @@ -1,3 +1,6 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
  +
   ________________________________________________________________________
   
   OpenPKG Security Advisory                            The OpenPKG Project
  @@ -6,8 +9,8 @@
   OpenPKG-SA-2003.perl-www                                     06-Aug-2003
   ________________________________________________________________________
   
  -Package:             perl-www
  -Vulnerability:       CGI.pm cross site scripting
  +Package:             perl-www (CGI.pm)
  +Vulnerability:       cross site scripting
   OpenPKG Specific:    no
   
   Affected Releases:   Affected Packages:            Corrected Packages:
  @@ -20,25 +23,26 @@
   Description:
     According to a security advisory [0] from [EMAIL PROTECTED] a
     cross site scripting vulnerability exists in the start_form() function
  -  in CGI.pm [1]. The Common Vulnerabilities and Exposures (CVE) project
  -  assigned the id CAN-2003-0615 [2] to the problem.
  +  from CGI.pm [1]. The Common Vulnerabilities and Exposures (CVE)
  +  project assigned the id CAN-2003-0615 [2] to the problem.
   
     Note that beginning with perl-www-20030609-20030609 and
  -  perl-www-1.3.0-1.3.0 a preliminary patch was already included which
  -  fixes the specific issue discussed in the original SA. The corrected
  -  packages include a more generalized patch.
  +  perl-www-1.3.0-1.3.0 a preliminary vendor patch was already included
  +  which fixes the specific issue discussed in the original advisory. Our
  +  corrected packages now include the more generalized patch the author
  +  uses in his latest version.
   
     Please check whether you are affected by running "<prefix>/bin/rpm
     -q perl-www". If you have the "perl-www" package installed and its
     version is affected (see above), we recommend that you immediately
  -  upgrade it (see Solution).
  +  upgrade it (see Solution). [3][4]
   
   Solution:
     Select the updated source RPM appropriate for your OpenPKG release
     [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
     location, verify its integrity [9], build a corresponding binary RPM
     from it [3] and update your OpenPKG installation by applying the
  -  binary RPM [4]. For the current release OpenPKG 1.2, perform the
  +  binary RPM [4]. For the current release OpenPKG 1.3, perform the
     following operations to permanently fix the security problem (for
     other releases adjust accordingly).
   
  @@ -73,3 +77,10 @@
   for details on how to verify the integrity of this advisory.
   ________________________________________________________________________
   
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQE/MSQugHWT4GPEy58RAg8kAKDgc5NmCQwakcFYgvPSq6UmZ+YS4QCg0/Nw
  +HT1320vVAJLYvDezyPDxmxY=
  +=D7Pf
  +-----END PGP SIGNATURE-----
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/page.pl
  ============================================================================
  $ cvs diff -u -r1.21 -r1.22 page.pl
  --- openpkg-web/security/page.pl      6 Aug 2003 15:26:43 -0000       1.21
  +++ openpkg-web/security/page.pl      6 Aug 2003 15:52:44 -0000       1.22
  @@ -13,7 +13,7 @@
   foreach my $sa (reverse sort @SA) {
       my ($base, $name, $year) = ($sa =~ m|^(OpenPKG-SA-((\d+)\..+))\.txt$|);
       next if ($name =~ m|^0000|);
  -    next if ($name =~ m|^2003\.03[7-9]|);
  +    next if ($name =~ m|^2003\.03[8-9]|);
       if ($this_year ne $year) {
           $sidebar .= "<br>\n";
           $this_year = $year;
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to