version 1.11, 2016/10/10 00:14:28 |
version 1.12, 2016/10/10 20:27:30 |
|
|
|
|
<li id="012_amap"> |
<li id="012_amap"> |
<font color="#009000"> |
<font color="#009000"> |
<strong>012: RELIABILITY FIX: October 08, 2016</strong></font> |
<strong>012: RELIABILITY FIX: October 8, 2016</strong></font> |
<i>All architectures</i> |
<i>All architectures</i> |
<br> |
<br> |
Allocation of an amap with at least 131072 slots causes an integer overflow |
Allocation of an amap with at least 131072 slots causes an integer overflow |
that leads to an infinite loop. |
that leads to an infinite loop. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/012_amap.patch.sig"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/012_amap.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="013_ssh_kexinit"> |
|
<font color="#009000"> |
|
<strong>013: RELIABILITY FIX: October 10, 2016</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
A protocol parsing bug in sshd can lead to unauthenticated memory |
|
and CPU consumption. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/013_ssh_kexinit.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|