018: SECURITY FIX: November 6, 2002 Incorrect argument checking in the getrlimit(2) system call may allow an attacker to crash the kernel. A source code patch exists which remedies the problem.
017: SECURITY FIX: November 6, 2002 An attacker can bypass the restrictions imposed by sendmail's restricted shell, smrsh(8), and execute arbitrary commands with the privileges of his own account. A source code patch exists which remedies the problem.
924 :名無しさん@お腹いっぱい。 :02/11/09 03:49
ipcheck.py が core 吐く...
925 :名無しさん@お腹いっぱい。 :02/11/10 04:35
/pub/OpenBSD/3.2 の中身って不変なんだと思ってたけど、変わるんだね
14941997 Oct 5 23:53 srcsys.tar.gz 14543441 May 18 20:50 srcsys.tar.gz
A patch for the named buffer overflow is now available. The bug could allow an attacker to execute code as the user that named runs as. In the default OpenBSD named configuration, named runs as its own, non-root, user in a chrooted jail. This lessens the impact of the bug to the level of a denial of service. Anyone not running named chrooted should start to do so immediately.