[BACK]Return to errata71.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata71.html between version 1.24 and 1.25

version 1.24, 2023/01/25 15:43:39 version 1.25, 2023/02/07 16:09:04
Line 326 
Line 326 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
   <li id="p022_x509">
   <strong>022: SECURITY FIX: February 7, 2023</strong>
   &nbsp; <i>All architectures</i>
   <br>
   A malicious certificate revocation list or timestamp response token would
   allow an attacker to read arbitrary memory.
   <br>
   <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/022_x509.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="p023_xserver">
   <strong>023: SECURITY FIX: February 7, 2023</strong>
   &nbsp; <i>All architectures</i>
   <br>
   CVE-2023-0494: use after free in the Xinput X server extension.
   <br>
   <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/023_xserver.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   <li id="p024_smtpd">
   <strong>024: SECURITY FIX: February 7, 2023</strong>
   &nbsp; <i>All architectures</i>
   <br>
   smtpd(8) could abort due to a connection from a local, scoped ipv6 address.
   <br>
   <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/024_smtpd.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
 </ul>  </ul>
   
 <hr>  <hr>

Legend:
Removed from v.1.24  
changed lines
  Added in v.1.25