version 1.11, 2014/12/05 02:59:00 |
version 1.12, 2014/12/10 20:09:32 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li><a name="012_virtio"></a> |
|
<font color="#009000"><strong>018: RELIABILITY FIX: December 9, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
Missing memory barriers in virtio(4) can lead to hangs with virtio devices, |
|
like vio(4) and vioblk(4). |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/012_virtio.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li><a name="013_unbound"></a> |
|
<font color="#009000"><strong>019: RELIABILITY FIX: December 9, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
Fix a denial of service where a malicious authority could make the resolver chase an |
|
endless series of delegations. (CVE-2014-8602) |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/013_unbound.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li><a name="014_xserver"></a> |
|
<font color="#009000"><strong>019: SECURITY FIX: December 9, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
One year after Ilja van Sprundel discovered and reported a large number |
|
of issues in the way the X server code base handles requests from X clients, |
|
they have been fixed. |
|
<br> |
|
<a href="http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/">X Advisory</a> |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/014_xserver.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
|
</ul> |
</ul> |
|
|