version 1.6, 2019/05/28 15:05:14 |
version 1.7, 2019/06/09 16:07:21 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p004_bgpd"> |
|
<strong>004: RELIABILITY FIX: June 10, 2019</strong> |
|
<i>All architectures</i> |
|
<br> |
|
Several issues were corrected in bgpd: "network" statements with no fixed |
|
prefix were incorrectly removed when configuration was reloaded, "export |
|
default-route" did not work, and "network 0.0.0.0/0" could not be used |
|
in some cases. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.5/common/004_bgpd.patch.sig"> |
|
A source code patch exists which remedies these problems.</a> |
|
<p> |
|
|
|
<li id="p005_libssl"> |
|
<strong>005: RELIABILITY FIX: June 10, 2019</strong> |
|
<i>All architectures</i> |
|
<br> |
|
TLS handshakes fail if a client supporting TLS 1.3 tries to connect to |
|
an OpenBSD server and sends a key share extension that does not include |
|
X25519. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.5/common/005_libssl.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |