version 1.9, 2002/11/16 18:25:07 |
version 1.10, 2003/01/21 03:47:10 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=cvs></a> |
|
<li><font color=#009000><strong>020: SECURITY FIX: January 20, 2003</strong></font><br> |
|
A double free in |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a> |
|
could allow an attacker to execute code with the privileges of the |
|
user running cvs. This is only an issue when the cvs command is |
|
being run on a user's behalf as a different user. This means that, |
|
in most cases, the issue only exists for cvs configurations that use |
|
the <em>pserver</em> client/server connection method. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/020_cvs.patch">A |
|
source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=named></a> |
<a name=named></a> |
<li><font color=#009000><strong>019: SECURITY FIX: November 14, 2002</strong></font><br> |
<li><font color=#009000><strong>019: SECURITY FIX: November 14, 2002</strong></font><br> |
A buffer overflow in |
A buffer overflow in |