version 1.9, 2021/11/09 13:43:18 |
version 1.10, 2021/11/25 19:00:22 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p005_unpcon"> |
|
<strong>005: RELIABILITY FIX: November 26, 2021</strong> |
|
<i>All architectures</i> |
|
<br> |
|
An unprivileged user could crash the kernel by using UNIX-domain |
|
sockets in multiple threads. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.0/common/005_unpcon.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p006_x509"> |
|
<strong>006_x509: SECURITY FIX: November 26, 2021</strong> |
|
<i>All architectures</i> |
|
<br> |
|
In some situations the X.509 verifier would discard an error on |
|
an unverified certificate chain, resulting in an authentication bypass. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.0/common/006_x509.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |