Return to errata.html CVS log | Up to [local] / www |
version 1.560, 2006/08/25 15:56:06 | version 1.561, 2006/09/02 23:58:06 | ||
---|---|---|---|
|
|
||
<a name="vax"></a> | <a name="vax"></a> | ||
<ul> | <ul> | ||
<li><a name="sppp"></a> | |||
<font color="#009000"><strong>009: SECURITY FIX: September 2, 2006</strong></font> <i>All architectures</i><br> | |||
Due to the failure to correctly validate LCP configuration option lengths, | |||
it is possible for an attacker to send LCP packets via an | |||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sppp&apropos=0&sektion=4&manpath=OpenBSD+Current&arch=i386&format=html">sppp(4)</a> | |||
connection causing the kernel to panic. | |||
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a> | |||
<br> | |||
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch"> | |||
A source code patch exists which remedies this problem</a>.<br> | |||
<p> | |||
<li><a name="isakmpd"></a> | <li><a name="isakmpd"></a> | ||
<font color="#009000"><strong>008: SECURITY FIX: August 25, 2006</strong></font> <i>All architectures</i><br> | <font color="#009000"><strong>008: SECURITY FIX: August 25, 2006</strong></font> <i>All architectures</i><br> | ||
A problem in | A problem in |