From 66b66b84f0b3f43fac632b23274d6eca2529376b Mon Sep 17 00:00:00 2001 From: bmah Date: Wed, 11 Jul 2001 01:10:45 +0000 Subject: New release note: FreeBSD-SA-01:42. --- release/doc/en_US.ISO8859-1/relnotes/article.sgml | 5 +++++ release/doc/en_US.ISO8859-1/relnotes/common/new.sgml | 5 +++++ 2 files changed, 10 insertions(+) (limited to 'release') diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index 7a7c85c..766fb71 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -884,6 +884,11 @@ user's UID before attempting to unlink the authentication forwarding file, nullifying the effects of a race. + A flaw allowed some signal handlers to remain in effect in a + child process after being exec-ed from its parent. This allowed + an attacker to execute arbitrary code in the context of a setuid + binary. This flaw has been corrected (see security advisory + FreeBSD-SA-01:42). &merged; Userland Changes diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index 7a7c85c..766fb71 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -884,6 +884,11 @@ user's UID before attempting to unlink the authentication forwarding file, nullifying the effects of a race. + A flaw allowed some signal handlers to remain in effect in a + child process after being exec-ed from its parent. This allowed + an attacker to execute arbitrary code in the context of a setuid + binary. This flaw has been corrected (see security advisory + FreeBSD-SA-01:42). &merged; Userland Changes -- cgit v1.1