version 1.477, 2004/03/04 06:37:25 |
version 1.478, 2004/03/09 09:42:11 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<li><a name="tcp"></a> |
|
<font color="#009000"><strong>013: RELIABILITY FIX: March 8, |
|
2004</strong></font><br> |
|
OpenBSD's TCP/IP stack did not impose limits on how many out-of-order |
|
TCP segments are queued in the system. An attacker could |
|
send out-of-order TCP segments and trick the system into using all |
|
available memory buffers. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/013_tcp.patch"> |
|
A source code patch exists which remedies the problem</a>.<br> |
|
<p> |
<li><a name="font"></a> |
<li><a name="font"></a> |
<font color="#009000"><strong>012: RELIABILITY FIX: February 14, |
<font color="#009000"><strong>012: RELIABILITY FIX: February 14, |
2004</strong></font><br> |
2004</strong></font><br> |