-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org email@example.com firstname.lastname@example.org OpenPKG-SA-2003.052 17-Dec-2003 ________________________________________________________________________ Package: cvs Vulnerability: filesystem intrusion OpenPKG Specific: no Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT <= cvs-1.12.2-20031027 >= cvs-1.12.3-20031205 OpenPKG 1.3 <= cvs-1.12.1-1.3.0 >= cvs-1.12.1-1.3.1 OpenPKG 1.2 <= cvs-1.11.5-1.2.2 >= cvs-1.11.5-1.2.3 Dependent Packages: none Description: According to a CVS  security update , a malformed module request can cause the CVS server to attempt to create directories and possibly files at the root of the filesystem holding the CVS repository. Even though filesystem permissions usually prevent the creation of these misplaced directories, the corrected OpenPKG packages include a CVS server which rejects such malformed requests. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2003-0977  to the problem. Please check whether you are affected by running "
/bin/rpm -q cvs". If the "cvs" package is indeed installed and its version is affected (see above), please upgrade it immediately according to OpenPKG recommendations (see Solution).  Solution: Select the updated source RPM appropriate for your OpenPKG release , fetch it from the OpenPKG FTP service  or a mirror location, verify its integrity , build a corresponding binary RPM from it  and update your OpenPKG installation by applying the binary RPM . For the current release OpenPKG 1.3, perform the following operations to permanently fix the security problem (for other releases adjust accordingly). $ ftp ftp.openpkg.org ftp> bin ftp> cd release/1.3/UPD ftp> get cvs-1.12.1-1.3.1.src.rpm ftp> bye $ /bin/rpm -v --checksig cvs-1.12.1-1.3.1.src.rpm $ /bin/rpm --rebuild cvs-1.12.1-1.3.1.src.rpm $ su - # /bin/rpm -Fvh /RPM/PKG/cvs-1.12.1-1.3.1.*.rpm ________________________________________________________________________ References:  http://www.cvshome.org/  http://ccvs.cvshome.org/servlets/NewsItemView?newsID=85  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0977  http://www.openpkg.org/tutorial.html#regular-source  http://www.openpkg.org/tutorial.html#regular-binary  ftp://ftp.openpkg.org/release/1.2/UPD/cvs-1.11.5-1.2.3.src.rpm  ftp://ftp.openpkg.org/release/1.3/UPD/cvs-1.12.1-1.3.1.src.rpm  ftp://ftp.openpkg.org/release/1.2/UPD/  ftp://ftp.openpkg.org/release/1.3/UPD/  http://www.openpkg.org/security.html#signature ________________________________________________________________________ For security reasons, this advisory was digitally signed with the OpenPGP public key "OpenPKG "(ID 63C4CB9F) of the OpenPKG project which you can retrieve from http://pgp.openpkg.org and hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ for details on how to verify the integrity of this advisory. ________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Comment: OpenPKG iD8DBQE/4ESigHWT4GPEy58RAqlHAKDWNcptxAw/fBrCZlCt9EB3oOZYHQCg4/yJ 2L2AHtnVJFxsDz7DosQUeeI= =NJuM -----END PGP SIGNATURE-----