version 1.19, 2015/07/16 14:36:35 |
version 1.20, 2015/07/27 13:51:35 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="011_execve"> |
|
<font color="#009000"><strong>011: RELIABILITY FIX: July 26, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
A kernel memory leak could be triggered by an unprivileged user in |
|
a failure case when using execve under systrace. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/011_execve.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="012_patch"> |
|
<font color="#009000"><strong>012: SECURITY FIX: July 26, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
The patch utility could be made to invoke arbitrary commands via |
|
the obsolete RCS support when processing a crafted input file. |
|
This patch deletes the RCS support. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/012_patch.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |