lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <404345D2.4000609@comsquared.com> From: dgianndrea at comsquared.com (David Gianndrea) Subject: ip_option_process: bad opt 0x5 Check this out. http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F112234&zone_32=ip_option_process%3A%20bad%20opt%200x5 David Hane wrote: > Anybody else seeing this in their logs lately? I'm only getting it on solaris > machines and wondering if there is some new exploit out there that I haven't > heard about. I'm really getting hammered with these right now. > > Dave > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html -- David Gianndrea Senior Network Engineer Comsquared Systems, Inc.
Powered by blists - more mailing lists