version 1.8, 2007/09/07 22:45:17 |
version 1.9, 2007/10/09 16:49:01 |
|
|
|
|
<ul> |
<ul> |
|
|
|
<li><a name="010_dhcpd"></a> |
|
<font color="#009000"><strong>010: SECURITY FIX: October 8, 2007</strong></font> <i>All architectures</i><br> |
|
Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br> |
|
A DHCP client that claimed to require a maximum message size less than |
|
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/010_dhcpd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="009_file"></a> |
<li><a name="009_file"></a> |
<font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font> <i>All Architectures</i><br> |
<font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font> <i>All Architectures</i><br> |
Fix possible heap overflow in file(1), aka CVE-2007-1536.<br> |
Fix possible heap overflow in file(1), aka CVE-2007-1536.<br> |