version 1.535, 2005/05/17 18:38:33 |
version 1.536, 2005/06/07 14:26:56 |
|
|
consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>. |
consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>. |
<hr> |
<hr> |
|
|
<li> |
<!-- Temporarily put anchors for all archs here. Remove later. --> |
There are no security patches for 3.7 at this time. |
<a name="all"></a> |
|
<a name="alpha"></a> |
|
<a name="amd64"></a> |
|
<a name="cats"></a> |
|
<a name="hp300"></a> |
|
<a name="hppa"></a> |
|
<a name="i386"></a> |
|
<a name="mvme88k"></a> |
|
<a name="mac68k"></a> |
|
<a name="macppc"></a> |
|
<a name="mvme68k"></a> |
|
<a name="mvme88k"></a> |
|
<a name="sparc"></a> |
|
<a name="sparc64"></a> |
|
<a name="vax"></a> |
|
<ul> |
|
|
|
<li><a name="cvs"></a> |
|
<font color="#009000"><strong>001: SECURITY FIX: June 7, 2005</strong></font> <i>All architectures</i><br> |
|
|
|
Fix a buffer overflow, memory leaks, and NULL pointer dereference in |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a> |
|
. None of these issues are known to be exploitable. |
|
<a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</a> |
|
. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.6/common/016_cvs.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
</ul> |
</ul> |
|
|
<br> |
<br> |