version 1.542, 2005/10/29 17:18:27 |
version 1.543, 2006/01/05 05:34:07 |
|
|
<a name="vax"></a> |
<a name="vax"></a> |
<ul> |
<ul> |
|
|
<li>None yet. |
<li><a name="fd"></a> |
|
<font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font> <i>All architectures</i><br> |
|
Do not allow users to trick suid programs into re-opening files via /dev/fd. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/002_fd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="perl"></a> |
|
<font color="#009000"><strong>001: SECURITY FIX: January 5, 2006</strong></font> <i>All architectures</i><br> |
|
A buffer overflow has been found in the Perl interpreter with the sprintf function which |
|
may be exploitable under certain conditions. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
</ul> |
</ul> |
|
|
<br> |
<br> |