version 1.4, 2003/05/14 13:17:43 |
version 1.5, 2003/08/04 16:39:29 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=realpath></a> |
|
<li><font color="#009000"><strong>015: SECURITY FIX: August 4, 2003</strong></font><br> |
|
An off-by-one error exists in the C library function |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=realpath&sektion=3">realpath(3)</a>. |
|
Since this same bug resulted in a root compromise in the wu-ftpd ftp server |
|
it is possible that this bug may allow an attacker to gain escalated privileges |
|
on OpenBSD.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/015_realpath.patch">A |
|
source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=sendmail2></a> |
<a name=sendmail2></a> |
<li><font color="#009000"><strong>014: SECURITY FIX: March 31, 2003</strong></font><br> |
<li><font color="#009000"><strong>014: SECURITY FIX: March 31, 2003</strong></font><br> |
A buffer overflow in the address parsing in |
A buffer overflow in the address parsing in |