version 1.8, 2022/05/15 21:43:00 |
version 1.9, 2022/07/24 14:00:56 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p006_xserver"> |
|
<strong>006: SECURITY FIX: July 24, 2022</strong> |
|
<i>All architectures</i> |
|
<br> |
|
Input validation failures in the X server request parsing code can |
|
lead to out of bounds memory accesses for authorized clients. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/006_xserver.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p007_cron"> |
|
<strong>007: RELIABILITY FIX: July 24, 2022</strong> |
|
<i>All architectures</i> |
|
<br> |
|
cron(8) aborted due to strange poll timevals. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/007_cron.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |