version 1.28, 2020/10/29 17:01:16 |
version 1.29, 2020/11/09 17:22:11 |
|
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.7/common/021_xinitom.patch.sig"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.7/common/021_xinitom.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
|
|
<p> |
<p> |
|
|
<li id="p022_xserverlen"> |
<li id="p022_xserverlen"> |
<strong>022: SECURITY FIX: August 25, 2020</strong> |
<strong>022: SECURITY FIX: August 25, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<p> |
|
<li id="p023_amdgpu"> |
<li id="p023_amdgpu"> |
<strong>023: SECURITY FIX: September 5, 2020</strong> |
<strong>023: SECURITY FIX: September 5, 2020</strong> |
<i>amd64, arm64</i> |
<i>amd64, arm64</i> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<p> |
|
<li id="p024_mmap"> |
<li id="p024_mmap"> |
<strong>024: RELIABILITY FIX: October 6, 2020</strong> |
<strong>024: RELIABILITY FIX: October 6, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<p> |
|
<li id="p025_bgpd"> |
<li id="p025_bgpd"> |
<strong>025: RELIABILITY FIX: October 29, 2020</strong> |
<strong>025: RELIABILITY FIX: October 29, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<p> |
|
<li id="p026_icmp6"> |
<li id="p026_icmp6"> |
<strong>026: SECURITY FIX: October 29, 2020</strong> |
<strong>026: SECURITY FIX: October 29, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<p> |
|
<li id="p027_tmux"> |
<li id="p027_tmux"> |
<strong>027: SECURITY FIX: October 29, 2020</strong> |
<strong>027: SECURITY FIX: October 29, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.7/common/027_tmux.patch.sig"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.7/common/027_tmux.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p028_unwind"> |
|
<strong>028: RELIABILITY FIX: November 10, 2020</strong> |
|
<i>All architectures</i> |
|
<br> |
|
unwind fails to process large DNS replies. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.7/common/028_unwind.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p029_rpki"> |
|
<strong>029: RELIABILITY FIX: November 10, 2020</strong> |
|
<i>All architectures</i> |
|
<br> |
|
rpki-client incorrectly checks the manifest validity interval. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.7/common/029_rpki.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|