Displaying 20 results from an estimated 400 matches similar to: "FreeBSD Security Advisory FreeBSD-SA-08:09.icmp6"
2008 Feb 18
0
[Bug 1441] New: flow record for ICMP6 missing type and code values
https://bugzilla.mindrot.org/show_bug.cgi?id=1441
Summary: flow record for ICMP6 missing type and code values
Classification: Unclassified
Product: softflowd
Version: -current
Platform: amd64
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: softflowd
AssignedTo: djm at
2008 Jan 14
0
FreeBSD Security Advisory FreeBSD-SA-08:02.libc
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08:02.libc Security Advisory
The FreeBSD Project
Topic: inet_network() buffer overflow
Category: core
Module: libc
Announced: 2008-01-14
2018 Dec 18
0
Multicast (ICMP6 router solicitation) flood
On Fri, Dec 14, 2018 at 11:13:55PM +0100, Lars Kruse wrote:
> I am a happy user of tinc in multiple environments. It is beautiful - thank you!
>
> Today I noticed that a network of around 20 nodes suffered from a flood of
> packages like the following:
> IP6 fe80::e4eb:74b6:57e0:c3e1 > ff02::2: ICMP6, router solicitation, length 8
[...]
> Most of the tinc nodes use v1.0.31.
2008 Sep 03
0
FreeBSD Security Advisory FreeBSD-SA-08:07.amd64
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08:07.amd64 Security Advisory
The FreeBSD Project
Topic: amd64 swapgs local privilege escalation
Category: core
Module: sys_amd64_amd64
2008 Dec 22
0
FreeBSD Security Advisory FreeBSD-SA-08:12.ftpd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08:12.ftpd Security Advisory
The FreeBSD Project
Topic: Cross-site request forgery in ftpd(8)
Category: core
Module: ftpd
Announced:
2003 Aug 16
3
-STABLE problems / icmp6.c?
Hi folks,
I just cvsupped the latest -STABLE source code, and noticed that it doesn't
seem to build. Here's what happens:
---
root@jasmina> make buildworld
--------------------------------------------------------------
>>> Rebuilding the temporary build tree
--------------------------------------------------------------
rm -rf /usr/obj/usr/src/i386
mkdir -p
2008 Jan 14
0
FreeBSD Security Advisory FreeBSD-SA-08:01.pty
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08:01.pty Security Advisory
The FreeBSD Project
Topic: pty snooping
Category: core
Module: libc_stdlib / libutil
Announced: 2008-01-14
2018 Dec 14
3
Multicast (ICMP6 router solicitation) flood
Hello,
I am a happy user of tinc in multiple environments. It is beautiful - thank you!
Today I noticed that a network of around 20 nodes suffered from a flood of
packages like the following:
IP6 fe80::e4eb:74b6:57e0:c3e1 > ff02::2: ICMP6, router solicitation, length 8
For the first ten hours these nodes (even the usually completely idle ones) have
seen incoming traffic of around 1 MBit/s
2008 Nov 24
5
FreeBSD Security Advisory FreeBSD-SA-08:11.arc4random
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08.11.arc4random Security Advisory
The FreeBSD Project
Topic: arc4random(9) predictable sequence vulnerability
Category: core
Module: sys
Announced:
2008 Nov 24
5
FreeBSD Security Advisory FreeBSD-SA-08:11.arc4random
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08.11.arc4random Security Advisory
The FreeBSD Project
Topic: arc4random(9) predictable sequence vulnerability
Category: core
Module: sys
Announced:
2007 Apr 26
0
FreeBSD Security Advisory FreeBSD-SA-07:03.ipv6
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:03.ipv6 Security Advisory
The FreeBSD Project
Topic: IPv6 Routing Header 0 is dangerous
Category: core
Module: ipv6
Announced:
2012 Jun 12
0
FreeBSD Errata Notice FreeBSD-EN-12:02.ipv6refcount
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-EN-12:02.ipv6refcount Errata Notice
The FreeBSD Project
Topic: Reference count errors in IPv6 code
Category: core
Modules: sys_netinet sys_netinet6
2007 Apr 26
4
FreeBSD Security Advisory FreeBSD-SA-07:03.ipv6
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:03.ipv6 Security Advisory
The FreeBSD Project
Topic: IPv6 Routing Header 0 is dangerous
Category: core
Module: ipv6
Announced:
2005 Jul 27
0
FreeBSD Security Advisory FreeBSD-SA-05:19.ipsec
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-05:19.ipsec Security Advisory
The FreeBSD Project
Topic: Incorrect key usage in AES-XCBC-MAC
Category: core
Module: netinet6
Announced:
2005 Jul 27
0
FreeBSD Security Advisory FreeBSD-SA-05:19.ipsec
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-05:19.ipsec Security Advisory
The FreeBSD Project
Topic: Incorrect key usage in AES-XCBC-MAC
Category: core
Module: netinet6
Announced:
2008 Apr 01
0
HEADS UP: FreeBSD 5.5, 6.1, and 6.2 EoLs coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On May 31st, FreeBSD 5.5, FreeBSD 6.1, and FreeBSD 6.2 will have reached
their End of Life and will no longer be supported by the FreeBSD Security
Team. Since FreeBSD 5.5 is the last remaining supported release from the
FreeBSD 5.x stable branch, support for the FreeBSD 5.x stable branch will
also cease at the same point. Users of
2008 Apr 01
0
HEADS UP: FreeBSD 5.5, 6.1, and 6.2 EoLs coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On May 31st, FreeBSD 5.5, FreeBSD 6.1, and FreeBSD 6.2 will have reached
their End of Life and will no longer be supported by the FreeBSD Security
Team. Since FreeBSD 5.5 is the last remaining supported release from the
FreeBSD 5.x stable branch, support for the FreeBSD 5.x stable branch will
also cease at the same point. Users of
2009 Apr 01
0
HEADS UP: FreeBSD 7.0 EoL coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On April 30th, FreeBSD 7.0 will reach its End of Life and will no longer be
supported by the FreeBSD Security Team. Users of FreeBSD 7.0 are strongly
encouraged to upgrade to FreeBSD 7.1 before that date.
Note that the End of Life date for FreeBSD 7.0 was originally announced as
being February 28, but was delayed by two months in
2009 Apr 01
0
HEADS UP: FreeBSD 7.0 EoL coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On April 30th, FreeBSD 7.0 will reach its End of Life and will no longer be
supported by the FreeBSD Security Team. Users of FreeBSD 7.0 are strongly
encouraged to upgrade to FreeBSD 7.1 before that date.
Note that the End of Life date for FreeBSD 7.0 was originally announced as
being February 28, but was delayed by two months in
2017 Feb 23
1
Re: Is it possible to block ipv6 auto configuration entering the tinc tunnel?
hi
It was not working when i applied the rules on the vpn card. But I wondered if maybe bridging of vpn and eth0 was messing this up. I thought it was enough to only apply it to the vpn card
root at JOTVPN:~# brctl show
bridge name bridge id STP enabled interfaces
bridge 8000.000c29638a7e no eth0
vpn
so I tried the