version 1.186, 1999/07/18 02:27:07 |
version 1.187, 1999/07/30 21:23:52 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=chflags></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
Do not permit regular users to chflags(2) or fchflags(2) on character or |
|
block devices which they may currently be the owner of. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/chflags.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=nroff></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
Cause groff(1) to be invoked with the -S flag, when called by nroff(1), |
|
to avoid various groff features which may be security issues. On the |
|
whole, this is not really a security issue, but it was discussed on |
|
BUGTRAQ as if it is. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/nroff.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
<a name=fts></a> |
<a name=fts></a> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
Programs using fts(3) could dump core when given a directory structure |
Programs using fts(3) could dump core when given a directory structure |