version 1.18, 2019/11/21 21:01:42 |
version 1.19, 2019/12/04 11:11:35 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p020_mesaxlock"> |
|
<strong>020: SECURITY FIX: December 4, 2019</strong> |
|
<i>All architectures</i> |
|
<br> |
|
Environment-provided paths are used for dlopen() in mesa, resulting in |
|
escalation to the auth group in xlock(1). |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.5/common/020_mesaxlock.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p021_libcauth"> |
|
<strong>021: SECURITY FIX: December 4, 2019</strong> |
|
<i>All architectures</i> |
|
<br> |
|
libc's authentication layer performed insufficient username validation. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.5/common/021_libcauth.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p022_xenodm"> |
|
<strong>022: SECURITY FIX: December 4, 2019</strong> |
|
<i>All architectures</i> |
|
<br> |
|
xenodm uses the libc authentication layer incorrectly. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.5/common/022_xenodm.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |