version 1.24, 2023/01/25 15:43:39 |
version 1.25, 2023/02/07 16:09:04 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p022_x509"> |
|
<strong>022: SECURITY FIX: February 7, 2023</strong> |
|
<i>All architectures</i> |
|
<br> |
|
A malicious certificate revocation list or timestamp response token would |
|
allow an attacker to read arbitrary memory. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/022_x509.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p023_xserver"> |
|
<strong>023: SECURITY FIX: February 7, 2023</strong> |
|
<i>All architectures</i> |
|
<br> |
|
CVE-2023-0494: use after free in the Xinput X server extension. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/023_xserver.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p024_smtpd"> |
|
<strong>024: SECURITY FIX: February 7, 2023</strong> |
|
<i>All architectures</i> |
|
<br> |
|
smtpd(8) could abort due to a connection from a local, scoped ipv6 address. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/024_smtpd.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |