version 1.22, 2018/11/17 22:02:36 |
version 1.23, 2018/11/29 19:32:45 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p024_perl"> |
|
<font color="#009000"> |
|
<strong>024: SECURITY FIX: November 29, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
Various overflows exist in perl. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.3/common/024_perl.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p025_uipc"> |
|
<font color="#009000"> |
|
<strong>025: RELIABILITY FIX: November 29, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
UNIX domain sockets leak kernel memory with MSG_PEEK on SCM_RIGHTS, or can |
|
attempt excessive memory allocations leading to a crash. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.3/common/025_uipc.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |