version 1.86, 1998/03/18 22:19:46 |
version 1.87, 1998/03/31 23:24:26 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=named></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A vulnerability exists when (and only when) /etc/named.conf has the |
|
<strong>fake-iquery</strong> option enabled. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.2/common/named.patch> |
|
A patch is available which corrects this behaviour</a>. |
|
<p> |
|
<a name=ping></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A vulnerability exists in ping(8); if the -R option is used to record |
|
routes, an attacker can spoof a reply packet that will overflow inside |
|
ping. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.2/common/ping.patch> |
|
A patch is available which corrects this behaviour</a>. |
|
<p> |
<a name=sourceroute></a> |
<a name=sourceroute></a> |
<li><strong><font color=#009000>SECURITY FIX</strong></font><br> |
<li><strong><font color=#009000>SECURITY FIX</strong></font><br> |
If the sysctl variable <strong>net.inet.ip.forwarding</strong> is |
If the sysctl variable <strong>net.inet.ip.forwarding</strong> is |