undeadly_errata.rss.xml - sfeed_tests - sfeed tests and RSS and Atom files
 (HTM) git clone git://git.codemadness.org/sfeed_tests
 (DIR) Log
 (DIR) Files
 (DIR) Refs
 (DIR) README
 (DIR) LICENSE
       ---
       undeadly_errata.rss.xml (4909B)
       ---
            1 <?xml version="1.0" encoding="ISO-8859-1"?>
            2 
            3 <rss version="0.92">
            4 <channel>
            5 
            6 <title>OpenBSD Errata</title>
            7 <link>https://www.undeadly.org/</link>
            8 <description>OpenBSD 6.8 Errata via Undeadly</description>
            9 <language>en-us</language>
           10 <managingEditor>editors@undeadly.org</managingEditor>
           11 
           12 <image>
           13 <title>OpenBSD Journal</title>
           14 <url>https://www.undeadly.org/images/logo.jpg</url>
           15 <link>https://www.undeadly.org/</link>
           16 <width>300</width>
           17 <height>100</height>
           18 <description>The OpenBSD Journal</description>
           19 </image>
           20 
           21 <item>
           22 <title>010 RELIABILITY smtpd's filter state machine can prematurely release resources leading to a crash. </title>
           23 <link>https://www.openbsd.org/errata68.html#p010_smtpd</link>
           24 <category>RELIABILITY</category>
           25 <pubDate>2020-12-24</pubDate>
           26 <description>
           27 <![CDATA[
           28 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/010_smtpd.patch.sig">^JA source code patch exists which remedies this problem.</a>
           29 ]]>
           30 </description>
           31 </item>
           32 
           33 <item>
           34 <title>009 RELIABILITY Process exit in multithreaded programs could result in the wrong exit code being reported. </title>
           35 <link>https://www.openbsd.org/errata68.html#p009_exit</link>
           36 <category>RELIABILITY</category>
           37 <pubDate>2020-12-08</pubDate>
           38 <description>
           39 <![CDATA[
           40 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/009_exit.patch.sig">^JA source code patch exists which remedies this problem.</a>
           41 ]]>
           42 </description>
           43 </item>
           44 
           45 <item>
           46 <title>008 SECURITY Malformed ASN.1 in a certificate revocation list or a timestamp response token can lead to a NULL pointer dereference. </title>
           47 <link>https://www.openbsd.org/errata68.html#p008_xmaplen</link>
           48 <category>SECURITY</category>
           49 <pubDate>2020-12-08</pubDate>
           50 <description>
           51 <![CDATA[
           52 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/008_asn1.patch.sig">^JA source code patch exists which remedies this problem.</a>
           53 ]]>
           54 </description>
           55 </item>
           56 
           57 <item>
           58 <title>007 SECURITY Multiple input validation failures in the X server XKB extension can lead to out of bounds memory accesses for authorized clients. </title>
           59 <link>https://www.openbsd.org/errata68.html#p007_xmaplen</link>
           60 <category>SECURITY</category>
           61 <pubDate>2020-12-01</pubDate>
           62 <description>
           63 <![CDATA[
           64 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/007_xmaplen.patch.sig">^JA source code patch exists which remedies this problem.</a>
           65 ]]>
           66 </description>
           67 </item>
           68 
           69 <item>
           70 <title>006 RELIABILITY rpki-client incorrectly checks the manifest validity interval.</title>
           71 <link>https://www.openbsd.org/errata68.html#p006_rpki</link>
           72 <category>RELIABILITY</category>
           73 <pubDate>2020-11-10</pubDate>
           74 <description>
           75 <![CDATA[
           76 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/006_rpki.patch.sig">^JA source code patch exists which remedies this problem.</a>
           77 ]]>
           78 </description>
           79 </item>
           80 
           81 <item>
           82 <title>005 RELIABILITY unwind fails to process large DNS replies.</title>
           83 <link>https://www.openbsd.org/errata68.html#p005_unwind</link>
           84 <category>RELIABILITY</category>
           85 <pubDate>2020-11-10</pubDate>
           86 <description>
           87 <![CDATA[
           88 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/005_unwind.patch.sig">^JA source code patch exists which remedies this problem.</a>
           89 ]]>
           90 </description>
           91 </item>
           92 
           93 <item>
           94 <title>004 RELIABILITY wg(4) could panic the kernel by releasing the wrong lock.</title>
           95 <link>https://www.openbsd.org/errata68.html#p004_wg</link>
           96 <category>RELIABILITY</category>
           97 <pubDate>2020-11-05</pubDate>
           98 <description>
           99 <![CDATA[
          100 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/004_wg.patch.sig">^JA source code patch exists which remedies this problem.</a>
          101 ]]>
          102 </description>
          103 </item>
          104 
          105 <item>
          106 <title>003 SECURITY tmux has a stack overflow in CSI parsing.</title>
          107 <link>https://www.openbsd.org/errata68.html#p003_tmux</link>
          108 <category>SECURITY</category>
          109 <pubDate>2020-10-29</pubDate>
          110 <description>
          111 <![CDATA[
          112 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/003_tmux.patch.sig">^JA source code patch exists which remedies this problem.</a>
          113 ]]>
          114 </description>
          115 </item>
          116 
          117 <item>
          118 <title>002 SECURITY When generating the ICMP6 response to an IPv6 packet, the kernel could use mbuf memory after freeing it. </title>
          119 <link>https://www.openbsd.org/errata68.html#p002_icmp6</link>
          120 <category>SECURITY</category>
          121 <pubDate>2020-10-29</pubDate>
          122 <description>
          123 <![CDATA[
          124 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/002_icmp6.patch.sig">^JA source code patch exists which remedies this problem.</a>
          125 ]]>
          126 </description>
          127 </item>
          128 
          129 <item>
          130 <title>001 RELIABILITY In bgpd, the roa-set parser could leak memory.</title>
          131 <link>https://www.openbsd.org/errata68.html#p001_bgpd</link>
          132 <category>RELIABILITY</category>
          133 <pubDate>2020-10-29</pubDate>
          134 <description>
          135 <![CDATA[
          136 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/001_bgpd.patch.sig">^JA source code patch exists which remedies this problem.</a>
          137 ]]>
          138 </description>
          139 </item>
          140 
          141 
          142 </channel>
          143 </rss>