version 1.6, 2020/11/03 17:09:49 |
version 1.7, 2020/11/09 17:22:11 |
|
|
|
|
<ul> |
<ul> |
|
|
<p> |
|
<li id="p001_bgpd"> |
<li id="p001_bgpd"> |
<strong>001: RELIABILITY FIX: October 29, 2020</strong> |
<strong>001: RELIABILITY FIX: October 29, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<p> |
|
<li id="p002_icmp6"> |
<li id="p002_icmp6"> |
<strong>002: SECURITY FIX: October 29, 2020</strong> |
<strong>002: SECURITY FIX: October 29, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<p> |
|
<li id="p003_tmux"> |
<li id="p003_tmux"> |
<strong>003: SECURITY FIX: October 29, 2020</strong> |
<strong>003: SECURITY FIX: October 29, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<p> |
|
<li id="p004_wg"> |
<li id="p004_wg"> |
<strong>004: RELIABILITY FIX: November 05, 2020</strong> |
<strong>004: RELIABILITY FIX: November 05, 2020</strong> |
<i>All architectures</i> |
<i>All architectures</i> |
|
|
wg(4) could panic the kernel by releasing the wrong lock. |
wg(4) could panic the kernel by releasing the wrong lock. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/004_wg.patch.sig"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/004_wg.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p005_unwind"> |
|
<strong>005: RELIABILITY FIX: November 10, 2020</strong> |
|
<i>All architectures</i> |
|
<br> |
|
unwind fails to process large DNS replies. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/005_unwind.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p006_rpki"> |
|
<strong>006: RELIABILITY FIX: November 10, 2020</strong> |
|
<i>All architectures</i> |
|
<br> |
|
rpki-client incorrectly checks the manifest validity interval. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/006_rpki.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|