version 1.1, 2014/09/06 13:59:35 |
version 1.2, 2014/09/30 19:44:30 |
|
|
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4). |
Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4). |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/001_rxr.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/001_rxr.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li><a name="002_nd6"></a> |
|
<font color="#009000"><strong>002: RELIABILITY FIX: October 1, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
If IPv6 autoconf is active on an interface and the autoconfprivacy extension is used, |
|
redundant addresses are added whenever an autoconfprivacy address expires. |
|
The autoconfprivacy extension is used by default and can be disabled with ifconfig(8) |
|
as a workaround: |
|
<pre> |
|
# ifconfig em0 -autoconfprivacy |
|
</pre> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/002_nd6.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li><a name="003_nginx"></a> |
|
<font color="#009000"><strong>003: SECURITY FIX: October 1, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual |
|
host confusion attacks in some configurations. |
|
This issue was assigned CVE-2014-3616. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/003_nginx.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|