diff options
author | Todd C. Miller <millert@cvs.openbsd.org> | 2001-10-01 17:18:31 +0000 |
---|---|---|
committer | Todd C. Miller <millert@cvs.openbsd.org> | 2001-10-01 17:18:31 +0000 |
commit | 43d38ada21ea773ebfa5e9e6541b53e85250309e (patch) | |
tree | 308de1fc7bbef3214be358a1762c932758b1f0ae /gnu/usr.sbin/sendmail/libsm/errstring.c | |
parent | 8dee1861c085bad9fb091c6ac52dca6100e5899c (diff) |
Update to sendmail 8.12.1.
A potential security problem has been uncovered in 8.12.0 which might
be exploited locally by malicious users to gain access to the client
mail queue. However, as long as the MTA accepts local connections,
the possible consequences of this potential local exploit are small.
Notice: some operating systems don't provide a way to completely drop
privileges from a set-group-ID program. In that case sendmail refuses
to run if unsafe options are given.
Diffstat (limited to 'gnu/usr.sbin/sendmail/libsm/errstring.c')
-rw-r--r-- | gnu/usr.sbin/sendmail/libsm/errstring.c | 14 |
1 files changed, 12 insertions, 2 deletions
diff --git a/gnu/usr.sbin/sendmail/libsm/errstring.c b/gnu/usr.sbin/sendmail/libsm/errstring.c index a836dbaab24..0736ae6b6d3 100644 --- a/gnu/usr.sbin/sendmail/libsm/errstring.c +++ b/gnu/usr.sbin/sendmail/libsm/errstring.c @@ -11,7 +11,7 @@ */ #include <sm/gen.h> -SM_RCSID("@(#)$Sendmail: errstring.c,v 1.8 2001/08/27 12:59:34 ca Exp $") +SM_RCSID("@(#)$Sendmail: errstring.c,v 1.11 2001/09/25 21:25:00 gshapiro Exp $") #include <errno.h> #include <stdio.h> /* sys_errlist, on some platforms */ @@ -43,6 +43,8 @@ const char * sm_errstring(errnum) int errnum; { + char *ret; + switch (errnum) { case EPERM: @@ -187,5 +189,13 @@ sm_errstring(errnum) return ldap_err2string(errnum - E_LDAPBASE); #endif /* LDAPMAP */ - return strerror(errnum); + ret = strerror(errnum); + if (ret == NULL) + { + static char buf[30]; + + (void) sm_snprintf(buf, sizeof buf, "Error %d", errnum); + return buf; + } + return ret; } |