version 1.5, 2005/07/08 03:25:36 |
version 1.6, 2005/07/23 00:47:04 |
|
|
<a name="vax"></a> |
<a name="vax"></a> |
<ul> |
<ul> |
|
|
|
<li><a name="libz2"></a> |
|
<font color="#009000"><strong>005: SECURITY FIX: July 21, 2005</strong></font> <i>All architectures</i><br> |
|
A buffer overflow has been found in |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a> |
|
which may be exploitable.<br> |
|
Please note that this fixes a different buffer overflow than the <a href="#libz">previous</a> zlib patch. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/005_libz.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="libz"></a> |
<li><a name="libz"></a> |
<font color="#009000"><strong>019: SECURITY FIX: July 6, 2005</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>019: SECURITY FIX: July 6, 2005</strong></font> <i>All architectures</i><br> |
A buffer overflow has been found in |
A buffer overflow has been found in |