version 1.29, 2017/12/10 21:15:18 |
version 1.30, 2018/02/02 22:43:05 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p034_ahopts"> |
|
<font color="#009000"> |
|
<strong>034: RELIABILITY FIX: February 2, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
Specially crafted IPsec AH packets with IP options or IPv6 extension |
|
headers could crash or hang the kernel. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/034_ahopts.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p035_prevhdr"> |
|
<font color="#009000"> |
|
<strong>035: RELIABILITY FIX: February 2, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
Processing IPv6 fragments could incorrectly access memory of an mbuf |
|
chain that is not within an mbuf. This may crash the kernel. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/035_prevhdr.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p036_etherip"> |
|
<font color="#009000"> |
|
<strong>036: SECURITY FIX: February 2, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
If the EtherIP tunnel protocol was disabled, IPv6 packets were not |
|
discarded properly. This causes a double free in the kernel. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/036_etherip.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |