version 1.36, 2015/07/16 14:36:35 |
version 1.37, 2015/07/27 13:51:35 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="026_tcp"> |
<li id="027_tcp"> |
<font color="#009000"><strong>027: SECURITY FIX: July 14, 2015</strong></font> |
<font color="#009000"><strong>027: SECURITY FIX: July 14, 2015</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A TCP socket can become confused and not properly cleanup resources. |
A TCP socket can become confused and not properly cleanup resources. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/027_tcp_persist.patch.sig"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/027_tcp_persist.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="028_execve"> |
|
<font color="#009000"><strong>028: RELIABILITY FIX: July 26, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
A kernel memory leak could be triggered by an unprivileged user in |
|
a failure case when using execve under systrace. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/028_execve.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="029_patch"> |
|
<font color="#009000"><strong>029: SECURITY FIX: July 26, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
The patch utility could be made to invoke arbitrary commands via |
|
the obsolete SCCS and RCS support when processing a crafted input file. |
|
This patch deletes the SCCS and RCS support. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/029_patch.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|