version 1.1, 2007/09/07 22:45:17 |
version 1.2, 2007/10/09 16:49:01 |
|
|
|
|
<ul> |
<ul> |
|
|
<li> |
<li><a name="001_dhcpd"></a> |
<font color="#009000"><strong>None Yet</strong></font><br> |
<font color="#009000"><strong>001: SECURITY FIX: October 8, 2007</strong></font> <i>All architectures</i><br> |
|
Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br> |
|
A DHCP client that claimed to require a maximum message size less than |
|
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/001_dhcpd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
</ul> |
</ul> |