Contributed by mk/reverse on from the patch-management dept.
Brad let us know that two new errata are out:
Errata text for the first entry:
Bugs in the tcp(4) stack can lead to memory exhaustion or processing of TCP segments with invalid SACK options and cause a system crash.
Errata text for the second entry:
Due to buffer overflows in telnet(1), a malicious server or man-in-the-middle attack could allow execution of arbitrary code with the privileges of the user invoking telnet(1).
(Comments are closed)