version 1.498, 2004/06/01 13:50:05 |
version 1.499, 2004/06/09 19:33:24 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<li><a name="cvs3"></a> |
|
<font color="#009000"><strong>011: SECURITY FIX: Jun 9, 2004</strong></font><br> |
|
Multiple remote vulnerabilities have been found in the |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&apropos=0&sektion=1&manpath=OpenBSD+Current&arch=i386&format=html">cvs(1)</a> |
|
server that allow an attacker to crash the server or possibly execute arbitrary |
|
code with the same privileges as the CVS server program. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/011_cvs3.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
<li><a name="fifofs"></a> |
|
<font color="#009000"><strong>010: RELIABILITY FIX: Jun 9, 2004</strong></font><br> |
|
A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in |
|
non-blocking mode for writing when there are no processes reading the FIFO. |
|
One program affected by this is the <a href="http://www.qmail.org/">qmail</a> |
|
mail server which could go into an infinite loop and consume all CPU. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/010_fifofs.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
<li><a name="kerberos"></a> |
<li><a name="kerberos"></a> |
<font color="#00900"><strong>009: SECURITY FIX: May 30, |
<font color="#00900"><strong>009: SECURITY FIX: May 30, |
2004</strong></font><br> |
2004</strong></font><br> |