version 1.538, 2005/06/16 02:42:45 |
version 1.539, 2005/06/21 04:04:27 |
|
|
<a name="vax"></a> |
<a name="vax"></a> |
<ul> |
<ul> |
|
|
|
<li><a name="sudo"></a> |
|
<font color="#009000"><strong>003: SECURITY FIX: June 20, 2005</strong></font> <i>All architectures</i><br> |
|
Due to a race condition in its command pathname handling, a user with |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo(8)</a> |
|
privileges may be able to run arbitrary commands if the user's entry |
|
is followed by an entry that grants <tt>sudo ALL</tt> privileges to |
|
another user. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/003_sudo.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="getsockopt"></a> |
<li><a name="getsockopt"></a> |
<font color="#009000"><strong>002: RELIABILITY FIX: June 15, 2005</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>002: RELIABILITY FIX: June 15, 2005</strong></font> <i>All architectures</i><br> |
As discovered by Stefan Miltchev calling |
As discovered by Stefan Miltchev calling |