OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   06-Aug-2003 15:37:34
  Branch: HEAD                             Handle: 2003080614373400

  Modified files:
    openpkg-web/security    00README OpenPKG-SA-2003.035-openssh.txt page.pl

  Log:
    finalize OpenSSH SA

  Summary:
    Revision    Changes     Path
    1.8         +1  -1      openpkg-web/security/00README
    1.2         +24 -14     openpkg-web/security/OpenPKG-SA-2003.035-openssh.txt
    1.20        +1  -1      openpkg-web/security/page.pl
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/00README
  ============================================================================
  $ cvs diff -u -r1.7 -r1.8 00README
  --- openpkg-web/security/00README     15 Jan 2003 15:42:25 -0000      1.7
  +++ openpkg-web/security/00README     6 Aug 2003 13:37:34 -0000       1.8
  @@ -3,7 +3,7 @@
   $ mv OpenPKG-SA-2003.00x-xxx.txt.asc OpenPKG-SA-2003.00x-xxx.txt
   $ gpg --verify OpenPKG-SA-2003.00x-xxx.txt
   $ mutt [EMAIL PROTECTED]
  -  Subject: [OpenPKG-SA-2003.00x] OpenPKG Security Advisory (xxx)
  +  Subject: [OpenPKG-SA-2003.034] OpenPKG Security Advisory (imagemagick)
     Approved: OPENPKG
   $ mutt [EMAIL PROTECTED]
     Subject: [OpenPKG-SA-2003.00x] OpenPKG Security Advisory (xxx)
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.035-openssh.txt
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.035-openssh.txt
  --- openpkg-web/security/OpenPKG-SA-2003.035-openssh.txt      6 Aug 2003 13:07:50 
-0000       1.1
  +++ openpkg-web/security/OpenPKG-SA-2003.035-openssh.txt      6 Aug 2003 13:37:34 
-0000       1.2
  @@ -1,3 +1,6 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
  +
   ________________________________________________________________________
   
   OpenPKG Security Advisory                            The OpenPKG Project
  @@ -12,26 +15,29 @@
   
   Affected Releases:   Affected Packages:          Corrected Packages:
   OpenPKG CURRENT      <= openssh-3.6.1p1-20030423 >= openssh-3.6.1p2-20030429
  -OpenPKG 1.3          N/A
  +OpenPKG 1.3          none                        N.A.
   OpenPKG 1.2          <= openssh-3.5p1-1.2.1      >= openssh-3.5p1-1.2.2
   
  +Dependent Packages:  none
  +
   Description:
  -  According to a Mediaservice.net security advisory [0], a information
  -  leakage exists in OpenSSH [1] 3.6.1p1 and earlier with PAM support
  -  enabled. When a user does not exist, an error message is send
  -  immediately which allows remote attackers to determine valid usernames
  -  via a timing attack. OpenPKG installations are only affected when the
  -  package was build '--with_pam yes', which is not the default. We could
  -  only reproduce the problem on Linux. It seems FreeBSD and Solaris are
  +  According to a Mediaservice.net security advisory [0], an information
  +  leakage exists in OpenSSH [1] 3.6.1p1 and earlier if PAM support
  +  is enabled. When a user does not exists, an error message is sent
  +  immediately (without any delays) which allows remote attackers to
  +  determine valid usernames via a timing attack. OpenPKG installations
  +  are only affected if the package was build with option "with_pam"
  +  set to "yes" -- which is not the default. The Common Vulnerabilities
  +  and Exposures (CVE) project assigned the id CAN-2003-0190 [2] to the
  +  problem.
  +  
  +  We could only reproduce the problem on Linux. FreeBSD and Solaris are
     not vulnerable, the patch does not affect their behaviour. However,
     the problem is related to the PAM configuration, not the operating
     system. Using a non-default configuration might leak information on
     other operating systems, too. On Linux systems, a valid workaround is
     to add a "nodelay" option to the pam_unix.so auth.
   
  -  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  -  CAN-2003-0190 [2] to the problem.
  -
     Please check whether you are affected by running "<prefix>/bin/rpm -q
     openssh". If you have the "openssh" package installed and its version
     is affected (see above), we recommend that you immediately upgrade it
  @@ -55,9 +61,6 @@
     $ <prefix>/bin/rpm --rebuild openssh-3.5p1-1.2.2.src.rpm
     $ su -
     # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/openssh-3.5p1-1.2.2.*.rpm
  -
  -  Additionally, we recommend that you rebuild and reinstall
  -  all dependent packages (see above), if any, too. [3][4]
   ________________________________________________________________________
   
   References:
  @@ -78,3 +81,10 @@
   for details on how to verify the integrity of this advisory.
   ________________________________________________________________________
   
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQE/MQR9gHWT4GPEy58RAiKkAKCpACytbxQN0ERLBbqNfmbZYYc59wCg6V33
  +XFH1dFEVD0jBbdBvvdIdIZM=
  +=GtfK
  +-----END PGP SIGNATURE-----
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/page.pl
  ============================================================================
  $ cvs diff -u -r1.19 -r1.20 page.pl
  --- openpkg-web/security/page.pl      10 Jul 2003 14:53:26 -0000      1.19
  +++ openpkg-web/security/page.pl      6 Aug 2003 13:37:34 -0000       1.20
  @@ -13,7 +13,7 @@
   foreach my $sa (reverse sort @SA) {
       my ($base, $name, $year) = ($sa =~ m|^(OpenPKG-SA-((\d+)\..+))\.txt$|);
       next if ($name =~ m|^0000|);
  -    next if ($name =~ m|^2003\.04[4-9]|);
  +    next if ($name =~ m|^2003\.03[6-9]|);
       if ($this_year ne $year) {
           $sidebar .= "<br>\n";
           $this_year = $year;
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to