version 1.20, 2002/04/26 04:56:37 |
version 1.21, 2002/05/08 23:02:53 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=fdalloc2></a> |
|
<li><font color=#009000><strong>026: SECURITY FIX: May 8, 2002</strong></font><br> |
|
A race condition exists where an attacker could fill the file descriptor |
|
table and defeat the kernel's protection of fd slots 0, 1, and 2 for a |
|
setuid or setgid process. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/026_fdalloc2.patch">A source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=sudo2></a> |
<a name=sudo2></a> |
<li><font color=#009000><strong>025: SECURITY FIX: April 25, 2002</strong></font><br> |
<li><font color=#009000><strong>025: SECURITY FIX: April 25, 2002</strong></font><br> |
A bug in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo(8)</a> may allow an attacker to corrupt the heap by specifying a custom prompt.<br> |
A bug in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo(8)</a> may allow an attacker to corrupt the heap by specifying a custom prompt.<br> |