version 1.8, 2013/05/31 14:23:27 |
version 1.9, 2013/06/12 10:36:12 |
|
|
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
<li><a name="006_tftpd"></a> |
|
<font color="#009000"><strong>006: RELIABILITY FIX: June 12, 2013</strong></font> <i>All architectures</i><br> |
|
A denial of services was discovered where certain combinations of |
|
TFTP options could cause OACK generation to fail, which in turn |
|
caused a double free in tftpd. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/006_tftpd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="007_vio"></a> |
|
<font color="#009000"><strong>007: RELIABILITY FIX: June 12, 2013</strong></font> <i>All architectures</i><br> |
|
Two flaws in the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vio&sektion=4">vio(4)</a> |
|
driver may cause a kernel panic, and may cause IPv6 neighbour discovery to fail |
|
due to multicast receive problems.<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/007_vio.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href="mailto:www@openbsd.org">www@openbsd.org</a> |
<a href="mailto:www@openbsd.org">www@openbsd.org</a> |
<br><small>$OpenBSD$</small> |
<br><small>$OpenBSD$</small> |
|
|