version 1.18, 2007/09/07 22:45:17 |
version 1.19, 2007/10/09 16:49:01 |
|
|
<a name="zaurus"></a> |
<a name="zaurus"></a> |
<ul> |
<ul> |
|
|
|
<li><a name="016_dhcpd"></a> |
|
<font color="#009000"><strong>016: SECURITY FIX: October 8, 2007</strong></font> <i>All architectures</i><br> |
|
Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br> |
|
A DHCP client that claimed to require a maximum message size less than |
|
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/016_dhcpd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="015_file"></a> |
<li><a name="015_file"></a> |
<font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font> <i>All Architectures</i><br> |
<font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font> <i>All Architectures</i><br> |
Fix possible heap overflow in file(1), aka CVE-2007-1536.<br> |
Fix possible heap overflow in file(1), aka CVE-2007-1536.<br> |