version 1.11, 2006/03/08 01:40:56 |
version 1.12, 2006/03/25 22:09:16 |
|
|
<a name="vax"></a> |
<a name="vax"></a> |
<ul> |
<ul> |
|
|
|
<li><a name="sendmail"></a> |
|
<font color="#009000"><strong>012: SECURITY FIX: March 25, 2006</strong></font> <i>all architecture</i><br> |
|
A race condition has been reported to exist in the handling by sendmail of |
|
asynchronous signals. A remote attacker may be able to execute arbitrary code with the |
|
privileges of the user running sendmail, typically root. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_sendmail.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="ssh"></a> |
<li><a name="ssh"></a> |
<font color="#009000"><strong>011: SECURITY FIX: February 12, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>011: SECURITY FIX: February 12, 2006</strong></font> <i>All architectures</i><br> |
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the |
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the |