version 1.7, 2018/11/18 03:28:24 |
version 1.8, 2018/11/29 19:32:45 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p005_perl"> |
|
<font color="#009000"> |
|
<strong>005: SECURITY FIX: November 29, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
Various overflows exist in perl. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.4/common/005_perl.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p006_uipc"> |
|
<font color="#009000"> |
|
<strong>006: RELIABILITY FIX: November 29, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
UNIX domain sockets leak kernel memory with MSG_PEEK on SCM_RIGHTS, or can |
|
attempt excessive memory allocations leading to a crash. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.4/common/006_uipc.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p007_smtpd"> |
|
<font color="#009000"> |
|
<strong>007: RELIABILITY FIX: November 29, 2018</strong></font> |
|
<i>All architectures</i> |
|
<br> |
|
The mail.mda and mail.lmtp delivery agents were not reporting temporary |
|
failures correctly, causing smtpd to bounce messages in some cases where |
|
it should have retried them. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.4/common/007_smtpd.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p008_qcow2"> |
|
<font color="#009000"> |
|
<strong>008: RELIABILITY FIX: November 29, 2018</strong></font> |
|
<i>amd64 and i386</i> |
|
<br> |
|
Writing more than 4GB to a qcow2 volume corrupts the virtual disk. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.4/common/008_qcow2.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |