version 1.5, 2018/11/02 15:36:07 |
version 1.6, 2018/11/17 22:02:36 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p003_portsmash"> |
|
<font color="#009000"> |
|
<strong>003: SECURITY FIX: November 17, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
The portsmash vulnerability allows exfiltration of elliptic curve keys. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.4/common/003_portsmash.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p004_lockf"> |
|
<font color="#009000"> |
|
<strong>004: RELIABILITY FIX: November 17, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
A recent change to POSIX file locks could cause incorrect results |
|
during lock acquisition. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.4/common/004_lockf.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |