undeadly_errata.rss.xml - sfeed_tests - sfeed tests and RSS and Atom files
(HTM) git clone git://git.codemadness.org/sfeed_tests
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
undeadly_errata.rss.xml (4909B)
---
1 <?xml version="1.0" encoding="ISO-8859-1"?>
2
3 <rss version="0.92">
4 <channel>
5
6 <title>OpenBSD Errata</title>
7 <link>https://www.undeadly.org/</link>
8 <description>OpenBSD 6.8 Errata via Undeadly</description>
9 <language>en-us</language>
10 <managingEditor>editors@undeadly.org</managingEditor>
11
12 <image>
13 <title>OpenBSD Journal</title>
14 <url>https://www.undeadly.org/images/logo.jpg</url>
15 <link>https://www.undeadly.org/</link>
16 <width>300</width>
17 <height>100</height>
18 <description>The OpenBSD Journal</description>
19 </image>
20
21 <item>
22 <title>010 RELIABILITY smtpd's filter state machine can prematurely release resources leading to a crash. </title>
23 <link>https://www.openbsd.org/errata68.html#p010_smtpd</link>
24 <category>RELIABILITY</category>
25 <pubDate>2020-12-24</pubDate>
26 <description>
27 <![CDATA[
28 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/010_smtpd.patch.sig">^JA source code patch exists which remedies this problem.</a>
29 ]]>
30 </description>
31 </item>
32
33 <item>
34 <title>009 RELIABILITY Process exit in multithreaded programs could result in the wrong exit code being reported. </title>
35 <link>https://www.openbsd.org/errata68.html#p009_exit</link>
36 <category>RELIABILITY</category>
37 <pubDate>2020-12-08</pubDate>
38 <description>
39 <![CDATA[
40 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/009_exit.patch.sig">^JA source code patch exists which remedies this problem.</a>
41 ]]>
42 </description>
43 </item>
44
45 <item>
46 <title>008 SECURITY Malformed ASN.1 in a certificate revocation list or a timestamp response token can lead to a NULL pointer dereference. </title>
47 <link>https://www.openbsd.org/errata68.html#p008_xmaplen</link>
48 <category>SECURITY</category>
49 <pubDate>2020-12-08</pubDate>
50 <description>
51 <![CDATA[
52 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/008_asn1.patch.sig">^JA source code patch exists which remedies this problem.</a>
53 ]]>
54 </description>
55 </item>
56
57 <item>
58 <title>007 SECURITY Multiple input validation failures in the X server XKB extension can lead to out of bounds memory accesses for authorized clients. </title>
59 <link>https://www.openbsd.org/errata68.html#p007_xmaplen</link>
60 <category>SECURITY</category>
61 <pubDate>2020-12-01</pubDate>
62 <description>
63 <![CDATA[
64 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/007_xmaplen.patch.sig">^JA source code patch exists which remedies this problem.</a>
65 ]]>
66 </description>
67 </item>
68
69 <item>
70 <title>006 RELIABILITY rpki-client incorrectly checks the manifest validity interval.</title>
71 <link>https://www.openbsd.org/errata68.html#p006_rpki</link>
72 <category>RELIABILITY</category>
73 <pubDate>2020-11-10</pubDate>
74 <description>
75 <![CDATA[
76 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/006_rpki.patch.sig">^JA source code patch exists which remedies this problem.</a>
77 ]]>
78 </description>
79 </item>
80
81 <item>
82 <title>005 RELIABILITY unwind fails to process large DNS replies.</title>
83 <link>https://www.openbsd.org/errata68.html#p005_unwind</link>
84 <category>RELIABILITY</category>
85 <pubDate>2020-11-10</pubDate>
86 <description>
87 <![CDATA[
88 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/005_unwind.patch.sig">^JA source code patch exists which remedies this problem.</a>
89 ]]>
90 </description>
91 </item>
92
93 <item>
94 <title>004 RELIABILITY wg(4) could panic the kernel by releasing the wrong lock.</title>
95 <link>https://www.openbsd.org/errata68.html#p004_wg</link>
96 <category>RELIABILITY</category>
97 <pubDate>2020-11-05</pubDate>
98 <description>
99 <![CDATA[
100 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/004_wg.patch.sig">^JA source code patch exists which remedies this problem.</a>
101 ]]>
102 </description>
103 </item>
104
105 <item>
106 <title>003 SECURITY tmux has a stack overflow in CSI parsing.</title>
107 <link>https://www.openbsd.org/errata68.html#p003_tmux</link>
108 <category>SECURITY</category>
109 <pubDate>2020-10-29</pubDate>
110 <description>
111 <![CDATA[
112 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/003_tmux.patch.sig">^JA source code patch exists which remedies this problem.</a>
113 ]]>
114 </description>
115 </item>
116
117 <item>
118 <title>002 SECURITY When generating the ICMP6 response to an IPv6 packet, the kernel could use mbuf memory after freeing it. </title>
119 <link>https://www.openbsd.org/errata68.html#p002_icmp6</link>
120 <category>SECURITY</category>
121 <pubDate>2020-10-29</pubDate>
122 <description>
123 <![CDATA[
124 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/002_icmp6.patch.sig">^JA source code patch exists which remedies this problem.</a>
125 ]]>
126 </description>
127 </item>
128
129 <item>
130 <title>001 RELIABILITY In bgpd, the roa-set parser could leak memory.</title>
131 <link>https://www.openbsd.org/errata68.html#p001_bgpd</link>
132 <category>RELIABILITY</category>
133 <pubDate>2020-10-29</pubDate>
134 <description>
135 <![CDATA[
136 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/001_bgpd.patch.sig">^JA source code patch exists which remedies this problem.</a>
137 ]]>
138 </description>
139 </item>
140
141
142 </channel>
143 </rss>