version 1.1, 2004/10/29 17:22:16 |
version 1.2, 2004/11/11 01:07:38 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<li><a name="pppd"></a> |
|
<font color="#009000"><strong>022: RELIABILITY FIX: November 11, 2004</strong></font><br> |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">pppd(8)</a> |
|
contains a bug that allows an attacker to crash his own connection, but it cannot |
|
be used to deny service to other users. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/022_pppd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
<li><a name="bind"></a> |
|
<font color="#009000"><strong>021: RELIABILITY FIX: November 11, 2004</strong></font><br> |
|
BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in |
|
cases where IPv6 connectivity is non-existant. This results in unneccessary timeouts and |
|
thus slow DNS queries. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/021_bind.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
<li><a name="radius"></a> |
<li><a name="radius"></a> |
<font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font><br> |
<font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font><br> |
Eilko Bos reported that radius authentication, as implemented by |
Eilko Bos reported that radius authentication, as implemented by |