Return to plus.html CVS log | Up to [local] / www |
version 1.864, 2003/03/12 00:02:06 | version 1.865, 2003/03/12 17:47:13 | ||
---|---|---|---|
|
|
||
<li>Upgrade <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=file&sektion=1">file(1)</a> to 3.41, to fix a buffer overflow. Get improved 64-bit ELF support as well. | <li>Upgrade <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=file&sektion=1">file(1)</a> to 3.41, to fix a buffer overflow. Get improved 64-bit ELF support as well. | ||
<li>In the libc stack smash handler, straight away block all signal handlers from running. | <li>In the libc stack smash handler, straight away block all signal handlers from running. | ||
<li>More fixes and improvements to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isp&sektion=4">isp(4)</a>. | <li>More fixes and improvements to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isp&sektion=4">isp(4)</a>. | ||
<li>Sendmail updated to 8.2.12. | <li>Sendmail updated to 8.12.8. | ||
<li><font color="#e00000"><strong>SECURITY FIX: A buffer overflow in the envelope comments processing in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&sektion=8">sendmail(8)</a> may allow an attacker to gain root privileges.</strong></font><br> | <li><font color="#e00000"><strong>SECURITY FIX: A buffer overflow in the envelope comments processing in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&sektion=8">sendmail(8)</a> may allow an attacker to gain root privileges.</strong></font><br> | ||
<a href="errata.html#sendmail">A source code patch is available</a>.<br> | <a href="errata.html#sendmail">A source code patch is available</a>.<br> | ||
<a href="stable.html"><font color="#00b000">[Applied to stable]</font></a> | <a href="stable.html"><font color="#00b000">[Applied to stable]</font></a> |