Contributed by grey on from the getting back to a slow start dept.
I noticed this during my morning romp...
"001: SECURITY FIX: June 7, 2005 All architectures
Fix a buffer overflow, memory leaks, and NULL pointer dereference in cvs(1) . None of these issues are known to be exploitable. CAN-2005-0753 ."
A source code patch exists which remedies this problem.
Be sure to check http://www.openbsd.org/errata.html as always.
(Comments are closed)
By Bas Keur (213.84.93.41) bas.keur@dmrt.net on http://www.dmrt.net
Patch for 3.6
Patch for 3.5
By Anonymous Coward (134.58.253.131) on
Soon we won't need to bother with that anymore... can't wait for opencvs :-)
Comments
By almeida (66.31.180.15) on
Comments
By miguel (193.147.239.254) on
Comments
By Matthias Kilian (84.134.5.239) on
Comments
By joris@ (213.224.72.181) on
be some bugs left, some commands are not supported yet.
about the server side, i have a diff to get it going, hopefully
that will go in soon. after that we need to finish the local
command stuff, since the server relies on that.
feel free to start testing opencvs, and give us feedback about
what is missing or what bugs you encounter and how we can reproduce
them, so we can fix them.
By Anonymous Coward (193.167.6.71) on
Comments
By Bert (68.100.43.184) blambert at thepresidency dot org on
By m0rf (68.104.57.241) on
Comments
By Anonymous Coward (68.202.41.228) on
Comments
By Anonymous Coward (68.145.40.99) on
By Anonymous Coward (66.44.2.219) on
Comments
By Anonymous Coward (143.129.75.52) on
By gabriel (200.212.63.10) on