*BSDThis forum is for the discussion of all BSD variants.
FreeBSD, OpenBSD, NetBSD, etc.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
009 and 010 (all architectures):
- A missing length check in zlib could lead to a heap buffer overflow.
- In libexpat fix heap use-after-free vulnerability CVE-2022-40674.
012, 013, 014 (all architectures):
- In libexpat fix heap use-after-free vulnerability CVE-2022-43680.
- CVE-2022-44638: An integer overflow in pixman may lead to an out-of-bounds write.
- A crafted TCP query from localhost could crash the unwind(8) daemon.
Syspatch 015 (all architectures):
In X11 server fix local privileges elevation and and remote code execution for ssh X forwarding sessions. This addresses CVE-2022-46340 CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344.
Syspatch 016 (AMD64, i386):
TLB entries were not invalidated for all types of engine on 12th generation Intel graphics (Tiger Lake, Rocket Lake, Alder Lake).
Syspatch 017 (all architectures):
Removing a domain can result in an out-of-bounds write in acme-client(8).
Syspatch 018 (all architectures):
A TCP packet with destination port 0 that matches a pf divert-to rule could crash the kernel.
Syspatch 019 (all architectures):
Input validation issues and path validation issues in libXpm can lead to infinite loops, memory corruption or arbitrary command execution. CVE-2022-46285, CVE-2022-44617 and CVE-2022-4883
Syspatch 022 (all architectures):
A malicious certificate revocation list or timestamp response token would allow an attacker to read arbitrary memory.
Syspatch 023 (all architectures):
CVE-2023-0494: use after free in the Xinput X server extension.
Syspatch 024 (all architectures):
smtpd(8) could abort due to a connection from a local, scoped ipv6 address.
Syspatch 025 (all architectures):
Missing bounds check in console terminal emulation could cause a kernel crash after receiving specially crafted escape sequences.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.