[BACK]Return to errata56.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata56.html between version 1.11 and 1.12

version 1.11, 2014/12/05 02:59:00 version 1.12, 2014/12/10 20:09:32
Line 203 
Line 203 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
   <li><a name="012_virtio"></a>
   <font color="#009000"><strong>018: RELIABILITY FIX: December 9, 2014</strong></font>
   &nbsp; <i>All architectures</i><br>
   Missing memory barriers in virtio(4) can lead to hangs with virtio devices,
   like vio(4) and vioblk(4).
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/012_virtio.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li><a name="013_unbound"></a>
   <font color="#009000"><strong>019: RELIABILITY FIX: December 9, 2014</strong></font>
   &nbsp; <i>All architectures</i><br>
   Fix a denial of service where a malicious authority could make the resolver chase an
   endless series of delegations. (CVE-2014-8602)
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/013_unbound.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li><a name="014_xserver"></a>
   <font color="#009000"><strong>019: SECURITY FIX: December 9, 2014</strong></font>
   &nbsp; <i>All architectures</i><br>
   One year after Ilja van Sprundel discovered and reported a large number
   of issues in the way the X server code base handles requests from X clients,
   they have been fixed.
   <br>
   <a href="http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/">X Advisory</a>
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/014_xserver.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   
 </ul>  </ul>
   

Legend:
Removed from v.1.11  
changed lines
  Added in v.1.12