version 1.8, 2020/12/01 17:02:44 |
version 1.9, 2020/12/08 16:52:59 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p008_xmaplen"> |
|
<strong>008: SECURITY FIX: December 8, 2020</strong> |
|
<i>All architectures</i> |
|
<br> |
|
Malformed ASN.1 in a certificate revocation list or a timestamp |
|
response token can lead to a NULL pointer dereference. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/008_asn1.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p009_exit"> |
|
<strong>009: RELIABILITY FIX: December 8, 2020</strong> |
|
<i>All architectures</i> |
|
<br> |
|
Process exit in multithreaded programs could result in the wrong exit |
|
code being reported. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.8/common/009_exit.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |