version 1.9, 2014/11/19 19:36:58 |
version 1.10, 2014/12/05 02:55:39 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li><a name="010_pipex"></a> |
|
<font color="#009000"><strong>010: RELIABILITY FIX: December 5, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
Several bugs were fixed that allowed a crash from remote when an active pipex |
|
session exists. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/010_pipex.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li><a name="011_pppoe"></a> |
|
<font color="#009000"><strong>017: RELIABILITY FIX: December 5, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
An incorrect memcpy call would result in corrupted MAC addresses when |
|
using PPPOE. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/011_pppoe.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
|
</ul> |
</ul> |
|
|
</body> |
</body> |