severity 391289 normal
thanks
On Thu, Oct 05, 2006 at 10:07:33PM +0200, Stefan Fritsch wrote:
> CVE-2006-4304:
>
> Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD
> 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before
> 20060902 allows remote attackers to ca
Processing commands for [EMAIL PROTECTED]:
> severity 391289 normal
Bug#391289: kfreebsd-5: several security issues in freebsd
Severity set to `normal' from `important'
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking syst
On Thu, Oct 05, 2006 at 10:07:33PM +0200, Stefan Fritsch wrote:
> CVE-2006-4178:
>
> Integer signedness error in the i386_set_ldt call in FreeBSD 5.5, and
> possibly earlier versions down to 5.2, allows local users to cause a
> denial of service (crash) via unspecified arguments that use negative
I will update a new package this evening.
Stefan Fritsch wrote:
Package: kfreebsd-5
Severity: grave
Tags: security
Justification: user security hole
Some security issues have been found in FreeBSD that probably affect
the Debian FreeBSD kernel:
CVE-2006-4304:
Buffer overflow in the sppp driv
Package: kfreebsd-5
Severity: grave
Tags: security
Justification: user security hole
Some security issues have been found in FreeBSD that probably affect
the Debian FreeBSD kernel:
CVE-2006-4304:
Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD
2.0 through 4.0 beta before
5 matches
Mail list logo