version 1.165, 1999/02/18 04:37:23 |
version 1.166, 1999/02/19 06:34:07 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=accept></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A race condition existed between accept(2) and select(2) which could |
|
permit an attacker to hang sockets from remote. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
<a name=maxqueue></a> |
<a name=maxqueue></a> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
IP fragment assembly can bog the machine excessively and cause problems. |
IP fragment assembly can bog the machine excessively and cause problems. |