version 1.13, 2023/02/02 12:27:02 |
version 1.14, 2023/02/07 16:09:04 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p018_x509"> |
|
<strong>018: SECURITY FIX: February 7, 2023</strong> |
|
<i>All architectures</i> |
|
<br> |
|
A malicious certificate revocation list or timestamp response token would |
|
allow an attacker to read arbitrary memory. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p019_xserver"> |
|
<strong>019: SECURITY FIX: February 7, 2023</strong> |
|
<i>All architectures</i> |
|
<br> |
|
CVE-2023-0494: use after free in the Xinput X server extension. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/019_xserver.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p020_smtpd"> |
|
<strong>020: SECURITY FIX: February 7, 2023</strong> |
|
<i>All architectures</i> |
|
<br> |
|
smtpd(8) could abort due to a connection from a local, scoped ipv6 address. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/020_smtpd.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |