OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   17-Dec-2003 12:58:49
  Branch: HEAD                             Handle: 2003121711584800

  Added files:
    openpkg-web/security    OpenPKG-SA-2003.053-lftp.txt
  Modified files:
    openpkg-web/security    OpenPKG-SA-2003.052-cvs.txt page.pl

  Log:
    final polishing and signing of SA lftp and SA cvs

  Summary:
    Revision    Changes     Path
    1.4         +30 -20     openpkg-web/security/OpenPKG-SA-2003.052-cvs.txt
    1.1         +84 -0      openpkg-web/security/OpenPKG-SA-2003.053-lftp.txt
    1.35        +1  -1      openpkg-web/security/page.pl
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.052-cvs.txt
  ============================================================================
  $ cvs diff -u -r1.3 -r1.4 OpenPKG-SA-2003.052-cvs.txt
  --- openpkg-web/security/OpenPKG-SA-2003.052-cvs.txt  17 Dec 2003 11:19:47 -0000     
 1.3
  +++ openpkg-web/security/OpenPKG-SA-2003.052-cvs.txt  17 Dec 2003 11:58:48 -0000     
 1.4
  @@ -1,3 +1,6 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
  +
   ________________________________________________________________________
   
   OpenPKG Security Advisory                            The OpenPKG Project
  @@ -7,39 +10,39 @@
   ________________________________________________________________________
   
   Package:             cvs
  -Vulnerability:       filesystem violation
  +Vulnerability:       filesystem intrusion
   OpenPKG Specific:    no
   
   Affected Releases:   Affected Packages:        Corrected Packages:
  -OpenPKG CURRENT      <= cvs-1.11.6-20030527    >= cvs-1.12.3-20031205
  +OpenPKG CURRENT      <= cvs-1.12.2-20031027    >= cvs-1.12.3-20031205
   OpenPKG 1.3          <= cvs-1.12.1-1.3.0       >= cvs-1.12.1-1.3.1
   OpenPKG 1.2          <= cvs-1.11.5-1.2.2       >= cvs-1.11.5-1.2.3
   
   Dependent Packages:  none
   
   Description:
  -  According to a cvs security update [0], a malformed module request can
  -  cause the CVS server [1] to attempt to create directories and possibly
  -  files at the root of the filesystem holding the CVS repository. Even
  -  though filesystem permissions usually prevent the creation of these
  -  misplaced directories, the corrected OpenPKG packages include a CVS
  -  server which rejects such malformed requests. The Common Vulnerabilities
  -  and Exposures (CVE) project assigned the id CAN-2003-0977 [2] to the
  -  problem.
  -
  -  Please check whether you are affected by running "<prefix>/bin/rpm -q
  -  cvs". If the "cvs" package is indeed installed and its version is
  -  affected (see above), please upgrade it immediately according to
  +  According to a CVS [0] security update [1], a malformed module
  +  request can cause the CVS server to attempt to create directories
  +  and possibly files at the root of the filesystem holding the CVS
  +  repository. Even though filesystem permissions usually prevent the
  +  creation of these misplaced directories, the corrected OpenPKG
  +  packages include a CVS server which rejects such malformed requests.
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0977 [2] to the problem.
  +
  +  Please check whether you are affected by running "<prefix>/bin/rpm
  +  -q cvs". If the "cvs" package is indeed installed and its version
  +  is affected (see above), please upgrade it immediately according to
     OpenPKG recommendations (see Solution). [3][4]
   
   Solution:
     Select the updated source RPM appropriate for your OpenPKG release
     [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
     location, verify its integrity [9], build a corresponding binary RPM
  -  from it [3] and update your OpenPKG installation by applying the binary
  -  RPM [4]. For the current release OpenPKG 1.3, perform the following
  -  operations to permanently fix the security problem (for other releases
  -  adjust accordingly).
  +  from it [3] and update your OpenPKG installation by applying the
  +  binary RPM [4]. For the current release OpenPKG 1.3, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
   
     $ ftp ftp.openpkg.org
     ftp> bin
  @@ -53,8 +56,8 @@
   ________________________________________________________________________
   
   References:
  -  [0] http://ccvs.cvshome.org/servlets/NewsItemView?newsID=85
  -  [1] http://www.cvshome.org/
  +  [0] http://www.cvshome.org/
  +  [1] http://ccvs.cvshome.org/servlets/NewsItemView?newsID=85
     [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0977
     [3] http://www.openpkg.org/tutorial.html#regular-source
     [4] http://www.openpkg.org/tutorial.html#regular-binary
  @@ -72,3 +75,10 @@
   for details on how to verify the integrity of this advisory.
   ________________________________________________________________________
   
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQE/4ESigHWT4GPEy58RAqlHAKDWNcptxAw/fBrCZlCt9EB3oOZYHQCg4/yJ
  +2L2AHtnVJFxsDz7DosQUeeI=
  +=NJuM
  +-----END PGP SIGNATURE-----
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.053-lftp.txt
  ============================================================================
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.053-lftp.txt
  --- /dev/null 2003-12-17 12:58:48.000000000 +0100
  +++ OpenPKG-SA-2003.053-lftp.txt      2003-12-17 12:58:49.000000000 +0100
  @@ -0,0 +1,84 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
  +
  +________________________________________________________________________
  +
  +OpenPKG Security Advisory                            The OpenPKG Project
  +http://www.openpkg.org/security.html              http://www.openpkg.org
  [EMAIL PROTECTED]                         [EMAIL PROTECTED]
  +OpenPKG-SA-2003.053                                          17-Dec-2003
  +________________________________________________________________________
  +
  +Package:             lftp
  +Vulnerability:       arbitrary code execution
  +OpenPKG Specific:    no
  +
  +Affected Releases:   Affected Packages:          Corrected Packages:
  +OpenPKG CURRENT      <= lftp-2.6.9-20031120      >= lftp-2.6.10-20031211
  +OpenPKG 1.3          <= lftp-2.6.6-1.3.0         >= lftp-2.6.6-1.3.1
  +OpenPKG 1.2          <= lftp-2.6.4-1.2.0         >= lftp-2.6.4-1.2.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a security advisory from Ulf H�rnhammar [0], a buffer
  +  overflow bug exists in the FTP/HTTP/HTTPS client LFTP [1] bug in
  +  versions up to and including 2.6.9. An attacker could create a
  +  carefully crafted directory on a website such that, if a user connects
  +  to that directory using the LFTP client and subsequently issues a "ls"
  +  or "rels" command, the attacker could execute arbitrary code on the
  +  users machine. The Common Vulnerabilities and Exposures (CVE) project
  +  assigned the id CAN-2003-0963 [2] to the problem.
  +
  +  Please check whether you are affected by running "<prefix>/bin/rpm -q
  +  lftp". If you have the "lftp" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution) [3][4].
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.3, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/1.3/UPD
  +  ftp> get lftp-2.6.6-1.3.1.src.rpm
  +  ftp> bye
  +  $ <prefix>/bin/rpm -v --checksig lftp-2.6.6-1.3.1.src.rpm
  +  $ <prefix>/bin/rpm --rebuild lftp-2.6.6-1.3.1.src.rpm
  +  $ su -
  +  # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/lftp-2.6.6-1.3.1.*.rpm
  +________________________________________________________________________
  +
  +References:
  +  [0] http://www.securityfocus.com/archive/1/347587/2003-12-13/2003-12-19/0
  +  [1] http://lftp.yar.ru/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0963
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.2/UPD/lftp-2.6.4-1.2.1.src.rpm
  +  [6] ftp://ftp.openpkg.org/release/1.3/UPD/lftp-2.6.6-1.3.1.src.rpm
  +  [7] ftp://ftp.openpkg.org/release/1.2/UPD/
  +  [8] ftp://ftp.openpkg.org/release/1.3/UPD/
  +  [9] http://www.openpkg.org/security.html#signature
  +________________________________________________________________________
  +
  +For security reasons, this advisory was digitally signed with the
  +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the
  +OpenPKG project which you can retrieve from http://pgp.openpkg.org and
  +hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/
  +for details on how to verify the integrity of this advisory.
  +________________________________________________________________________
  +
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQE/4ES3gHWT4GPEy58RAhWvAJ0XtJea7vqBrAx9OfsWiUNlLBVn0QCgub7I
  +eKC4m/yFGSRs+3syLFg26U0=
  +=5dTH
  +-----END PGP SIGNATURE-----
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/page.pl
  ============================================================================
  $ cvs diff -u -r1.34 -r1.35 page.pl
  --- openpkg-web/security/page.pl      4 Dec 2003 15:21:13 -0000       1.34
  +++ openpkg-web/security/page.pl      17 Dec 2003 11:58:48 -0000      1.35
  @@ -13,7 +13,7 @@
   foreach my $sa (reverse sort @SA) {
       my ($base, $name, $year) = ($sa =~ m|^(OpenPKG-SA-((\d+)\..+))\.txt$|);
       next if ($name =~ m|^0000|);
  -    next if ($name =~ m|^2003\.05[2-9]|);
  +    next if ($name =~ m|^2003\.05[4-9]|);
       if ($this_year ne $year) {
           $sidebar .= "<br>\n";
           $this_year = $year;
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to