version 1.2, 2008/08/24 19:10:08 |
version 1.3, 2008/11/02 05:30:23 |
|
|
|
|
<ul> |
<ul> |
|
|
<li>Nothing yet. |
<li><a name="002_vr"></a> |
|
<font color="#009000"><strong>002: RELIABILITY FIX: November 2, 2008</strong></font> <i>All architectures</i><br> |
|
Due to a bug in the vr(4) driver it is possible for a system using the vr(4) |
|
driver to panic under heavy load if the RX path runs out of mbufs. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/002_vr.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="001_ndp"></a> |
|
<font color="#009000"><strong>001: SECURITY FIX: November 2, 2008</strong></font> <i>All architectures</i><br> |
|
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor |
|
solicitation requests maybe allowing a nearby attacker to intercept traffic. |
|
The attacker must have IPv6 connectivity to the same router as their target for |
|
this vulnerability to be exploited. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/001_ndp.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
</ul> |
</ul> |
|
|