
 SuSE 7.3 Bash Initialization
 CD Ripping
 Apt for RPM
 PAM Pluggable Authentication Module
 Customizing sendmail.cf via SuSEconfig
 RPM RedHat Package Manager
 Open Secure Shell OpenSSH
 How to do local YaST2 Online Update
 Is my package fixed? Or: How to look into RPMs 
 SuSEfirewall2
| Is my package fixed? Or: How to look into RPMsProcedure 1. How to find out what HAS been changed: -
get the original source RPM as distributed on the CDs ("zq" or "src"
directory)
-
get the "fixed" package (see the security announcement, it contains
the link to where to find it.)
-
compare the changelogs of the packages:
rpm -qp --changelog /path/to/old.rpm > /tmp/old.changes
rpm -qp --changelog /path/to/new.rpm > /tmp/new.changes
diff -u /tmp/old.changes /tmp/new.changes | grep "^+"
-
compare the file lists (just for an overview):
/usr/lib/rpm/rpmdiff /path/to/old.rpm /path/to/new.rpm
This step would very likely show you that a patch file that has been
added.
-
to look further, unpack the source RPMs:
mkdir old; ( cd old; rpm2cpio /path/to/old.rpm | cpio -i --make-directories )
mkdir new; ( cd new; rpm2cpio /path/to/new.rpm | cpio -i --make-directories )
-
compare the two directories:
diff -uNr old new | less
or
diff -uNr old new | view - -c "syntax on"
if you like it colorful. Or, pipe it into diffstat, or print it out
via pdiff :-)
Procedure 2. How to find out what SHOULD have been changed: -
get the most recent sources (i.e. the fixed version) of, for
example, openssl.
-
get the second most recent sources (the vulnerable version).
-
untar both of them.
-
read and compare the ChangeLog or CHANGES files (or a similar file).
-
run a recursive diff about the two source directories to review the
changes.
Taking this even further, to really verify that the vulnerability is
gone, you need a testcase (an exploit).
Anyway, your picture about the packages should be complete by then, and
all your doubts hopefully gone.
For remaining questions you could contact this list
(<suse-security@suse.com>).
In case of serious concerns you should contact the SuSE Security Team
directly, writing to <security@suse.de>.
|