|
|
undeadly_errata.rss.xml - sfeed_tests - sfeed tests and RSS and Atom files |
|
|
 |
git clone git://git.codemadness.org/sfeed_tests (git://git.codemadness.org) |
|
|
 |
Log |
|
|
 |
Files |
|
|
 |
Refs |
|
|
 |
README |
|
|
 |
LICENSE |
|
|
|
--- |
|
|
|
undeadly_errata.rss.xml (4909B) |
|
|
|
--- |
|
|
|
1 <?xml version="1.0" encoding="ISO-8859-1"?> |
|
|
|
2 |
|
|
|
3 <rss version="0.92"> |
|
|
|
4 <channel> |
|
|
|
5 |
|
|
|
6 <title>OpenBSD Errata</title> |
|
|
|
7 <link>https://www.undeadly.org/</link> |
|
|
|
8 <description>OpenBSD 6.8 Errata via Undeadly</description> |
|
|
|
9 <language>en-us</language> |
|
|
|
10 <managingEditor>editors@undeadly.org</managingEditor> |
|
|
|
11 |
|
|
|
12 <image> |
|
|
|
13 <title>OpenBSD Journal</title> |
|
|
|
14 <url>https://www.undeadly.org/images/logo.jpg</url> |
|
|
|
15 <link>https://www.undeadly.org/</link> |
|
|
|
16 <width>300</width> |
|
|
|
17 <height>100</height> |
|
|
|
18 <description>The OpenBSD Journal</description> |
|
|
|
19 </image> |
|
|
|
20 |
|
|
|
21 <item> |
|
|
|
22 <title>010 RELIABILITY smtpd's filter state machine can prematurely release resources leading to a crash. </title> |
|
|
|
23 <link>https://www.openbsd.org/errata68.html#p010_smtpd</link> |
|
|
|
24 <category>RELIABILITY</category> |
|
|
|
25 <pubDate>2020-12-24</pubDate> |
|
|
|
26 <description> |
|
|
|
27 <![CDATA[ |
|
|
|
28 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/010_smtpd.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
29 ]]> |
|
|
|
30 </description> |
|
|
|
31 </item> |
|
|
|
32 |
|
|
|
33 <item> |
|
|
|
34 <title>009 RELIABILITY Process exit in multithreaded programs could result in the wrong exit code being reported. </title> |
|
|
|
35 <link>https://www.openbsd.org/errata68.html#p009_exit</link> |
|
|
|
36 <category>RELIABILITY</category> |
|
|
|
37 <pubDate>2020-12-08</pubDate> |
|
|
|
38 <description> |
|
|
|
39 <![CDATA[ |
|
|
|
40 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/009_exit.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
41 ]]> |
|
|
|
42 </description> |
|
|
|
43 </item> |
|
|
|
44 |
|
|
|
45 <item> |
|
|
|
46 <title>008 SECURITY Malformed ASN.1 in a certificate revocation list or a timestamp response token can lead to a NULL pointer dereference. </title> |
|
|
|
47 <link>https://www.openbsd.org/errata68.html#p008_xmaplen</link> |
|
|
|
48 <category>SECURITY</category> |
|
|
|
49 <pubDate>2020-12-08</pubDate> |
|
|
|
50 <description> |
|
|
|
51 <![CDATA[ |
|
|
|
52 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/008_asn1.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
53 ]]> |
|
|
|
54 </description> |
|
|
|
55 </item> |
|
|
|
56 |
|
|
|
57 <item> |
|
|
|
58 <title>007 SECURITY Multiple input validation failures in the X server XKB extension can lead to out of bounds memory accesses for authorized clients. </title> |
|
|
|
59 <link>https://www.openbsd.org/errata68.html#p007_xmaplen</link> |
|
|
|
60 <category>SECURITY</category> |
|
|
|
61 <pubDate>2020-12-01</pubDate> |
|
|
|
62 <description> |
|
|
|
63 <![CDATA[ |
|
|
|
64 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/007_xmaplen.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
65 ]]> |
|
|
|
66 </description> |
|
|
|
67 </item> |
|
|
|
68 |
|
|
|
69 <item> |
|
|
|
70 <title>006 RELIABILITY rpki-client incorrectly checks the manifest validity interval.</title> |
|
|
|
71 <link>https://www.openbsd.org/errata68.html#p006_rpki</link> |
|
|
|
72 <category>RELIABILITY</category> |
|
|
|
73 <pubDate>2020-11-10</pubDate> |
|
|
|
74 <description> |
|
|
|
75 <![CDATA[ |
|
|
|
76 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/006_rpki.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
77 ]]> |
|
|
|
78 </description> |
|
|
|
79 </item> |
|
|
|
80 |
|
|
|
81 <item> |
|
|
|
82 <title>005 RELIABILITY unwind fails to process large DNS replies.</title> |
|
|
|
83 <link>https://www.openbsd.org/errata68.html#p005_unwind</link> |
|
|
|
84 <category>RELIABILITY</category> |
|
|
|
85 <pubDate>2020-11-10</pubDate> |
|
|
|
86 <description> |
|
|
|
87 <![CDATA[ |
|
|
|
88 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/005_unwind.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
89 ]]> |
|
|
|
90 </description> |
|
|
|
91 </item> |
|
|
|
92 |
|
|
|
93 <item> |
|
|
|
94 <title>004 RELIABILITY wg(4) could panic the kernel by releasing the wrong lock.</title> |
|
|
|
95 <link>https://www.openbsd.org/errata68.html#p004_wg</link> |
|
|
|
96 <category>RELIABILITY</category> |
|
|
|
97 <pubDate>2020-11-05</pubDate> |
|
|
|
98 <description> |
|
|
|
99 <![CDATA[ |
|
|
|
100 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/004_wg.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
101 ]]> |
|
|
|
102 </description> |
|
|
|
103 </item> |
|
|
|
104 |
|
|
|
105 <item> |
|
|
|
106 <title>003 SECURITY tmux has a stack overflow in CSI parsing.</title> |
|
|
|
107 <link>https://www.openbsd.org/errata68.html#p003_tmux</link> |
|
|
|
108 <category>SECURITY</category> |
|
|
|
109 <pubDate>2020-10-29</pubDate> |
|
|
|
110 <description> |
|
|
|
111 <![CDATA[ |
|
|
|
112 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/003_tmux.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
113 ]]> |
|
|
|
114 </description> |
|
|
|
115 </item> |
|
|
|
116 |
|
|
|
117 <item> |
|
|
|
118 <title>002 SECURITY When generating the ICMP6 response to an IPv6 packet, the kernel could use mbuf memory after freeing it. </title> |
|
|
|
119 <link>https://www.openbsd.org/errata68.html#p002_icmp6</link> |
|
|
|
120 <category>SECURITY</category> |
|
|
|
121 <pubDate>2020-10-29</pubDate> |
|
|
|
122 <description> |
|
|
|
123 <![CDATA[ |
|
|
|
124 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/002_icmp6.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
125 ]]> |
|
|
|
126 </description> |
|
|
|
127 </item> |
|
|
|
128 |
|
|
|
129 <item> |
|
|
|
130 <title>001 RELIABILITY In bgpd, the roa-set parser could leak memory.</title> |
|
|
|
131 <link>https://www.openbsd.org/errata68.html#p001_bgpd</link> |
|
|
|
132 <category>RELIABILITY</category> |
|
|
|
133 <pubDate>2020-10-29</pubDate> |
|
|
|
134 <description> |
|
|
|
135 <![CDATA[ |
|
|
|
136 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/001_bgpd.patch.sig">^JA source code patch exists which remedies this problem.</a> |
|
|
|
137 ]]> |
|
|
|
138 </description> |
|
|
|
139 </item> |
|
|
|
140 |
|
|
|
141 |
|
|
|
142 </channel> |
|
|
|
143 </rss> |
|