The following security patches are available and should be applied.
* connect-dos.patch
Fixes a possible denial of service attack on systems that allow only one
non-connected socket bound to the same local address.
* realpath.patch
Fixes an off-by-one error in the fb_realpath() function, as derived
from the realpath function in BSD, may allow attackers to execute
arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via
commands that cause pathnames of length MAXPATHLEN+1 to trigger a
buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE,
(5) MKD, (6) RMD, (7) STOU, or (8) RNTO. SEE CVE CAN-2003-0466
* skeychallenge.patch
Fixes a potential stack overflow in the handling of S/Key challenge
logins.