Return to errata54.html CVS log | Up to [local] / www |
version 1.2, 2013/10/26 15:58:34 | version 1.3, 2013/11/08 03:33:46 | ||
---|---|---|---|
|
|
||
<a name="zaurus"></a> | <a name="zaurus"></a> | ||
<ul> | <ul> | ||
<li>None yet. | <li><a name="001_pflow"></a> | ||
<font color="#009000"><strong>001: RELIABILITY FIX: Nov 7, 2013</strong></font> <i>All architectures</i><br> | |||
A crash can happen on pflow(4) interface destruction. | |||
<p> | |||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/001_pflow.patch"> | |||
A source code patch exists which remedies this problem</a>.<br> | |||
<p> | |||
<li><a name="002_sshgcm"></a> | |||
<font color="#009000"><strong>002: SECURITY FIX: Nov 7, 2013</strong></font> <i>All architectures</i><br> | |||
A memory corruption vulnerability exists in the post- | |||
authentication sshd process when an AES-GCM cipher | |||
(aes128-gcm@openssh.com or aes256-gcm@openssh.com) is | |||
selected during kex exchange. | |||
Review the <a href="http://www.openssh.org/txt/gcmrekey.adv">gcmrekey advisory</a> | |||
for a mitigation. | |||
<p> | |||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/002_sshgcm.patch"> | |||
A source code patch exists which remedies this problem</a>.<br> | |||
<p> | |||
</ul> | </ul> | ||
<hr> | <hr> |