OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   17-Sep-2003 10:29:01
  Branch: HEAD                             Handle: 2003091709290001

  Modified files:
    openpkg-web             security.txt
    openpkg-web/security    OpenPKG-SA-2003.040-openssh.txt page.pl

  Log:
    final polishing and signing of OpenSSH SA

  Summary:
    Revision    Changes     Path
    1.47        +1  -1      openpkg-web/security.txt
    1.2         +41 -16     openpkg-web/security/OpenPKG-SA-2003.040-openssh.txt
    1.25        +1  -1      openpkg-web/security/page.pl
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  ============================================================================
  $ cvs diff -u -r1.46 -r1.47 security.txt
  --- openpkg-web/security.txt  17 Sep 2003 06:59:37 -0000      1.46
  +++ openpkg-web/security.txt  17 Sep 2003 08:29:00 -0000      1.47
  @@ -1,4 +1,4 @@
  -16-Sep-2003: Security Advisory: S<OpenPKG-SA-2003.040-openssh>
  +17-Sep-2003: Security Advisory: S<OpenPKG-SA-2003.040-openssh>
   15-Sep-2003: Security Advisory: S<OpenPKG-SA-2003.039-perl>
   15-Sep-2003: Security Advisory: S<OpenPKG-SA-2003.038-mysql>
   28-Aug-2003: Security Advisory: S<OpenPKG-SA-2003.037-sendmail>
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.040-openssh.txt
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.040-openssh.txt
  --- openpkg-web/security/OpenPKG-SA-2003.040-openssh.txt      17 Sep 2003 06:59:38 
-0000      1.1
  +++ openpkg-web/security/OpenPKG-SA-2003.040-openssh.txt      17 Sep 2003 08:29:01 
-0000      1.2
  @@ -1,3 +1,6 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
  +
   ________________________________________________________________________
   
   OpenPKG Security Advisory                            The OpenPKG Project
  @@ -10,27 +13,42 @@
   Vulnerability:       arbitrary code execution
   OpenPKG Specific:    no
   
  -Affected Releases:   Affected Packages:          Corrected Packages:
  -OpenPKG CURRENT      <= openssh-3.6.1p2-20030729 >= openssh-3.7p1-20030916
  -OpenPKG 1.3          <= openssh-3.6.1p2-1.3.0    >= openssh-3.6.1p2-1.3.1
  -OpenPKG 1.2          <= openssh-3.5p1-1.2.2      >= openssh-3.5p1-1.2.3
  +Affected Releases:   Affected Packages:        Corrected Packages:
  +OpenPKG CURRENT      <= openssh-3.7p1-20030916 >= openssh-3.7.1p1-20030917
  +OpenPKG 1.3          <= openssh-3.6.1p2-1.3.1  >= openssh-3.6.1p2-1.3.2
  +OpenPKG 1.2          <= openssh-3.5p1-1.2.3    >= openssh-3.5p1-1.2.4
   
   Dependent Packages:  none
   
   Description:
  -  According to a OpenSSH Security Advisory [0] all versions of OpenSSH's
  -  sshd prior to 3.7.1 contain buffer management errors [1]. Those
  +  According to an OpenSSH [1] Security Advisory [0], 2nd revision, all
  +  versions of OpenSSH's sshd(8) prior to version 3.7.1 contain buffer
  +  management errors. The discovery of additional similar errors by
  +  Solar Designer show that version 3.7.1 is affected, too. Those errors
     may allow remote attackers to execute arbitrary code by causing an
  -  incorrect amount of memory to be freed and corrupting the heap
  +  incorrect amount of memory to be cleared and corrupting the heap on
  +  fatal cleanups.
   
  -  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  -  CAN-2003-0693 [2] to the problem.
  +  The Common Vulnerabilities and Exposures (CVE) project assigned
  +  the id CAN-2003-0693 [2] to the problem, as initially explained
  +  in the 1st revision of the OpenSSH Security Advisory [0]. In the
  +  current 2nd revision, similar problems were described and fixed, too.
  +  Additionally, Solaris Designer found 4 more problematic instances
  +  of similar memory management errors. The corrected OpenPKG packages
  +  (see versions above) contain the collected bug fixes for all of those
  +  errors.
   
     Please check whether you are affected by running "<prefix>/bin/rpm -q
     openssh". If you have the "openssh" package installed and its version
     is affected (see above), we recommend that you immediately upgrade it
     (see Solution). [3][4]
   
  +  Notice that the previous package versions openssh-3.7p1-20030916,
  +  openssh-3.6.1p2-1.3.1 and openssh-3.5p1-1.2.3 contain the bug fixes
  +  from the OpenSSH Security Advisory [0], 1st revision, only. You are
  +  strongly advised to upgrade to the latest package versions because of
  +  the contained additional bug fixes.
  +
   Solution:
     Select the updated source RPM appropriate for your OpenPKG release
     [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  @@ -43,12 +61,12 @@
     $ ftp ftp.openpkg.org
     ftp> bin
     ftp> cd release/1.3/UPD
  -  ftp> get openssh-3.6.1p2-1.3.1.src.rpm
  +  ftp> get openssh-3.6.1p2-1.3.2.src.rpm
     ftp> bye
  -  $ <prefix>/bin/rpm -v --checksig openssh-3.6.1p2-1.3.1.src.rpm
  -  $ <prefix>/bin/rpm --rebuild openssh-3.6.1p2-1.3.1.src.rpm
  +  $ <prefix>/bin/rpm -v --checksig openssh-3.6.1p2-1.3.2.src.rpm
  +  $ <prefix>/bin/rpm --rebuild openssh-3.6.1p2-1.3.2.src.rpm
     $ su -
  -  # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/openssh-3.6.1p2-1.3.1.*.rpm
  +  # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/openssh-3.6.1p2-1.3.2.*.rpm
   ________________________________________________________________________
   
   References:
  @@ -57,10 +75,10 @@
     [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0693
     [3] http://www.openpkg.org/tutorial.html#regular-source
     [4] http://www.openpkg.org/tutorial.html#regular-binary
  -  [5] ftp://ftp.openpkg.org/release/1.2/UPD/openssh-3.6.1p2-1.3.1.src.rpm
  -  [6] ftp://ftp.openpkg.org/release/1.3/UPD/openssh-3.5p1-1.2.3.src.rpm
  -  [7] ftp://ftp.openpkg.org/release/1.2/UPD/
  +  [5] ftp://ftp.openpkg.org/release/1.3/UPD/openssh-3.6.1p2-1.3.2.src.rpm
  +  [6] ftp://ftp.openpkg.org/release/1.2/UPD/openssh-3.5p1-1.2.4.src.rpm
     [8] ftp://ftp.openpkg.org/release/1.3/UPD/
  +  [7] ftp://ftp.openpkg.org/release/1.2/UPD/
     [9] http://www.openpkg.org/security.html#signature
   ________________________________________________________________________
   
  @@ -71,3 +89,10 @@
   for details on how to verify the integrity of this advisory.
   ________________________________________________________________________
   
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQE/aBsSgHWT4GPEy58RAuzEAJ9nHSDAWuei8cKha78J96d80capfgCgk+o7
  +4tYQRFxKe/DU86lAynKHRpo=
  +=i3sR
  +-----END PGP SIGNATURE-----
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/page.pl
  ============================================================================
  $ cvs diff -u -r1.24 -r1.25 page.pl
  --- openpkg-web/security/page.pl      16 Sep 2003 10:18:54 -0000      1.24
  +++ openpkg-web/security/page.pl      17 Sep 2003 08:29:01 -0000      1.25
  @@ -13,7 +13,7 @@
   foreach my $sa (reverse sort @SA) {
       my ($base, $name, $year) = ($sa =~ m|^(OpenPKG-SA-((\d+)\..+))\.txt$|);
       next if ($name =~ m|^0000|);
  -    next if ($name =~ m|^2003\.04[0-9]|);
  +    next if ($name =~ m|^2003\.04[1-9]|);
       if ($this_year ne $year) {
           $sidebar .= "<br>\n";
           $this_year = $year;
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to