version 1.13, 2004/02/08 00:09:33 |
version 1.14, 2004/02/14 13:38:30 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<a name="font"></a> |
|
<li><font color="#009000"><strong>017: RELIABILITY FIX: February 14, |
|
2004</strong></font><br> |
|
Several buffer overflows exist in the code parsing |
|
font.aliases files in XFree86. Thanks to propolice, these cannot be |
|
exploited to gain privileges, but they can cause the X server to abort. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/017_font.patch"> |
|
A source code patch exists which remedies the problem</a>.<br> |
|
<p> |
<a name="ip6"></a> |
<a name="ip6"></a> |
<li><font color="#009000"><strong>016: SECURITY FIX: February 8, 2004</strong></font><br> |
<li><font color="#009000"><strong>016: SECURITY FIX: February 8, 2004</strong></font><br> |
An IPv6 MTU handling problem exists that could be used by an attacker |
An IPv6 MTU handling problem exists that could be used by an attacker |