LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Other *NIX Forums > *BSD
User Name
Password
*BSD This forum is for the discussion of all BSD variants.
FreeBSD, OpenBSD, NetBSD, etc.

Notices


Reply
  Search this Thread
Old 08-01-2022, 12:32 PM   #31
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313

008 (all architectures): bgpd(8) could fail to invalidate nexthops and incorrectly leave them in the FIB or Adj-RIB-Out.
 
Old 09-23-2022, 11:54 AM   #32
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
009 and 010 (all architectures):
- A missing length check in zlib could lead to a heap buffer overflow.
- In libexpat fix heap use-after-free vulnerability CVE-2022-40674.
 
Old 09-27-2022, 02:22 PM   #33
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
011 (all architectures): In smtpd(8), possible use-after-free if TLS handshake fails for outbound connections.
 
Old 12-01-2022, 02:03 PM   #34
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
012, 013, 014 (all architectures):
- In libexpat fix heap use-after-free vulnerability CVE-2022-43680.
- CVE-2022-44638: An integer overflow in pixman may lead to an out-of-bounds write.
- A crafted TCP query from localhost could crash the unwind(8) daemon.
 
Old 01-13-2023, 04:08 AM   #35
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 015 (all architectures):
In X11 server fix local privileges elevation and and remote code execution for ssh X forwarding sessions. This addresses CVE-2022-46340 CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344.

Syspatch 016 (AMD64, i386):
TLB entries were not invalidated for all types of engine on 12th generation Intel graphics (Tiger Lake, Rocket Lake, Alder Lake).

Syspatch 017 (all architectures):
Removing a domain can result in an out-of-bounds write in acme-client(8).

Syspatch 018 (all architectures):
A TCP packet with destination port 0 that matches a pf divert-to rule could crash the kernel.
 
Old 01-18-2023, 04:57 AM   #36
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 019 (all architectures):
Input validation issues and path validation issues in libXpm can lead to infinite loops, memory corruption or arbitrary command execution. CVE-2022-46285, CVE-2022-44617 and CVE-2022-4883
 
Old 01-23-2023, 08:46 AM   #37
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 020 (all architectures):
vmm(4) exposed unsupported cpuid feature flags to guests.

Syspatch 021 (all architectures):
vmd(8) exposed unsupported cpuid feature flags to guests.
 
Old 02-07-2023, 02:42 PM   #38
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 022 (all architectures):
A malicious certificate revocation list or timestamp response token would allow an attacker to read arbitrary memory.

Syspatch 023 (all architectures):
CVE-2023-0494: use after free in the Xinput X server extension.

Syspatch 024 (all architectures):
smtpd(8) could abort due to a connection from a local, scoped ipv6 address.
 
Old 02-27-2023, 04:03 AM   #39
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 025 (all architectures):
Missing bounds check in console terminal emulation could cause a kernel crash after receiving specially crafted escape sequences.
 
Old 03-18-2023, 08:51 PM   #40
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 026 (all architectures):
Out of bounds accesses in libc resolver.
 
Old 03-29-2023, 04:03 PM   #41
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 027 (all architectures):
Incorrect length checks allow an out-of-bounds read in bgpd(8).

Syspatch 028 (all architectures):
Xserver, CVE-2023-1393: use after free bug in the Composite server extension.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
My LG Stylo 4 Has Been Hijacked by Remote Administrator and OS as Well as Kernel Have Been Modified LongDuckDong_69 Linux - Newbie 3 11-17-2019 03:41 PM
LXer: OBS Studio 20.0 Has Been Released Released | It Brings a Modular User Interface & Stinger Transitions LXer Syndicated Linux News 0 08-11-2017 09:00 AM
My web server has been hacked. SU password has been disabled rcrosoer Linux - Security 11 06-27-2008 02:18 PM
OpenBSD - Where can i get OpenBSD 3.7 ISO CD -- Please help me b:z Linux - Software 5 04-08-2005 07:09 AM
OpenBSD - Where can i get OpenBSD 3.7 ISO CD -- Please help me b:z Linux - Software 1 04-07-2005 08:46 AM

LinuxQuestions.org > Forums > Other *NIX Forums > *BSD

All times are GMT -5. The time now is 11:00 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration