Slackware Essential And Critical Security Patch Updates - Page 77
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Pine 4.44 packages are now available to fix a problem with insecure URLhandling.
A buffer overflow has been found in the glob(3) function in glibc.Fixed packages for Slackware 8.0 are now available.
An exploitable overflow has been found in the address handling code of themutt mail client version 1.2.5i supplied with Slackware 8.0.
This problem can be exploited by local users to gain rootaccess. It is not exploitable by remote attackers without shell access.
The version of xntp3 that shipped with Slackware 7.1 as well as the version that was in Slackware -current contains a buffer overflow bug that could lead to a root compromise.
Sudo 1.6.3p6 is now available for Slackware 7.1 and Slackware -current. This release fixes a known buffer overflow.
Multiple vulnerabilities exist in the versions of BIND found in Slackware7.1 and -current.
glibc-2.2 contains a local vulnerability that affects all setuid rootbinaries.
Pine versions 4.21 and before contain a buffer overflow vulnerability which allows a remote user to execute arbitrary code on the local client by the sending of a special-crafted email message.
Several security problems have been found in the Apache web server software. It is recommended that all users of Apache upgrade to the latest stable release to fix these problems.
A vulnerability involving an input validation error in the "site exec" command has recently been identified in the wu-ftpd program (CERT Advisory CA-2000-13).
A string format / buffer overflow bug has been discovered in klogd, the kernel logging daemon.
An input validation bug was found to affect Slackware Linux 7.0, 7.1, and -current.
Three locale-related vulnerabilities with glibc 2.1.3 were recentlyreported on BugTraq. These vulnerabilities could allow local users togain root access.
A root exploit was found in the /usr/bin/suidperl5.6.0 program that shipped with the Slackware 7.1 perl.tgz package.
A remote exploit has been found in the FTP daemon, wu-ftpd. This can allow an attacker full access to your machine.
The sgid bit has been removed from this binary to prevent a potential security vulnerability.