Am Mittwoch, 1. Februar 2006 11:33 schrieb Joachim Schipper:
There are quite a few security lists which are likely to have
this information.
What about a grep OpenBSD on these security lists and/or a grep -i
security on the source-changes to filter out info?
Subcommander l0r3zz wrote:
This came across security focus and I haven't seen it mentioned here.
THey claim 3.8 is vulnerable, anybody know anything?
This has been fixed in -current, 3.8-stable and 3.7-stable.
This crash only works if you have 'scrub fragment crop' or 'scrub
fragment
On Wed, Feb 01, 2006 at 10:45:39AM +0100, MK wrote:
Hello everybody
I undersatnd that this issue doesn't affect many people even though I'd
like to know about the problem.
Is there any mailing list related to newly discovered security problems in
OpenBSD? I know only about
This came across security focus and I haven't seen it mentioned here.
THey claim 3.8 is vulnerable, anybody know anything?
l0r3zz
06.4.12 CVE: CVE-2006-0381
Platform: BSD
Title: OpenBSD PF IP Fragment Remote Denial Of Service
Description: PF is a packet filtering package that is integrated
4 matches
Mail list logo