version 1.472, 2004/02/07 23:39:36 |
version 1.473, 2004/02/14 13:38:30 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<a name="font"></a> |
|
<li><font color="#009000"><strong>012: RELIABILITY FIX: February 14, |
|
2004</strong></font><br> |
|
Several buffer overflows exist in the code parsing |
|
font.aliases files in XFree86. Thanks to propolice, these cannot be |
|
exploited to gain privileges, but they can cause the X server to abort. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/012_font.patch"> |
|
A source code patch exists which remedies the problem</a>.<br> |
|
<p> |
<a name="ip6"></a> |
<a name="ip6"></a> |
<li><font color="#009000"><strong>011: SECURITY FIX: February 8, 2004</strong></font><br> |
<li><font color="#009000"><strong>011: SECURITY FIX: February 8, 2004</strong></font><br> |
An IPv6 MTU handling problem exists that could be used by an attacker |
An IPv6 MTU handling problem exists that could be used by an attacker |