diff options
author | james <james@e7ae566f-a301-0410-adde-c780ea21d3b5> | 2006-05-11 16:21:33 +0000 |
---|---|---|
committer | james <james@e7ae566f-a301-0410-adde-c780ea21d3b5> | 2006-05-11 16:21:33 +0000 |
commit | 7d6c582090f48d3bbaa9cf20a67d0b8b4119dbfe (patch) | |
tree | 045291888599661b8db452332c264fb09826de9c /ChangeLog | |
parent | 3713f21f89256e7405e5ab2fb0e6e8e744876248 (diff) | |
download | openvpn-7d6c582090f48d3bbaa9cf20a67d0b8b4119dbfe.tar.gz openvpn-7d6c582090f48d3bbaa9cf20a67d0b8b4119dbfe.tar.xz openvpn-7d6c582090f48d3bbaa9cf20a67d0b8b4119dbfe.zip |
Added credit for CAN-2005-2532.
git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@1024 e7ae566f-a301-0410-adde-c780ea21d3b5
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -332,7 +332,7 @@ $Id$ the OpenSSL error queue is not properly flushed, which can result in another unrelated client instance on the server seeing the error and responding to it, resulting in disconnection of the unrelated client - (CAN-2005-2532). + (CAN-2005-2532). Credit: Mike Ireton. * Security Fix -- DoS attack against server by authenticated client. A malicious client in "dev tap" ethernet bridging mode could theoretically flood the server with packets appearing to come from |