Am Mittwoch, 1. Februar 2006 11:33 schrieb Joachim Schipper:
> There are quite a few security lists which are likely to have
> this information.
What about a grep "OpenBSD" on these security lists and/or a grep -i
"security" on the source-changes to filter out info?
MK wrote:
So my question is simple, is there any project which delas in all security
problems in OpenBSD? Or is it really necessary to check misc list and other
lists, many webpages every day?
You have to read source-changes or view the cvs logs. It is apparently only
in commit comments such
On Wed, Feb 01, 2006 at 10:45:39AM +0100, MK wrote:
> Hello everybody
>
> I undersatnd that this issue doesn't affect many people even though I'd
> like to know about the problem.
> Is there any mailing list related to newly discovered security problems in
> OpenBSD? I know only about security-a
AIL PROTECTED]>
Cc:
Sent: Wednesday, February 01, 2006 9:28 AM
Subject: Re: OpenBSD PF IP Fragment Remote Denial Of Service
Subcommander l0r3zz wrote:
This came across security focus and I haven't seen it mentioned here.
THey claim 3.8 is vulnerable, anybody know anything?
This has
Subcommander l0r3zz wrote:
This came across security focus and I haven't seen it mentioned here.
THey claim 3.8 is vulnerable, anybody know anything?
This has been fixed in -current, 3.8-stable and 3.7-stable.
This crash only works if you have 'scrub fragment crop' or 'scrub
fragment drop-ov
This came across security focus and I haven't seen it mentioned here.
THey claim 3.8 is vulnerable, anybody know anything?
l0r3zz
06.4.12 CVE: CVE-2006-0381
Platform: BSD
Title: OpenBSD PF IP Fragment Remote Denial Of Service
Description: PF is a packet filtering package that is integ
6 matches
Mail list logo