version 1.2, 2016/03/10 11:57:24 |
version 1.3, 2016/03/15 13:10:12 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="002_in6bind"> |
|
<font color="#009000"><strong>002: SECURITY FIX: March 16, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Insufficient checks in IPv6 socket binding and UDP IPv6 option |
|
processing allow a local user to send UDP packets with a source |
|
(IPv6 address + port) already reserved by another user. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/002_in6bind.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="003_pledge"> |
|
<font color="#009000"><strong>003: RELIABILITY FIX: March 16, 2016</strong></font> |
|
<i>All architectures</i><br> |
|
Incorrect path processing in pledge_namei() could result in unexpected |
|
program termination of pledge(2)'d programs. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/003_pledge.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |