LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Other *NIX Forums > *BSD
User Name
Password
*BSD This forum is for the discussion of all BSD variants.
FreeBSD, OpenBSD, NetBSD, etc.

Notices


Reply
  Search this Thread
Old 12-22-2022, 02:33 PM   #16
hitest
Guru
 
Registered: Mar 2004
Location: Canada
Distribution: Void, Debian, Slackware, VMs
Posts: 7,342

Rep: Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746

Updated. Thanks.
 
Old 01-13-2023, 04:06 AM   #17
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 013 (all architectures):
A TCP packet with destination port 0 that matches a pf divert-to rule could crash the kernel.
 
Old 01-18-2023, 04:57 AM   #18
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 014 (all architectures):
Input validation issues and path validation issues in libXpm can lead to infinite loops, memory corruption or arbitrary command execution. CVE-2022-46285, CVE-2022-44617 and CVE-2022-4883
 
Old 01-23-2023, 08:47 AM   #19
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 015 (all architectures):
vmm(4) exposed unsupported cpuid feature flags to guests.

Syspatch 016 (all architectures):
vmd(8) exposed unsupported cpuid feature flags to guests.
 
Old 02-02-2023, 12:26 PM   #20
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 017 (all architectures):
A double-free in the sshd pre-auth unprivileged process (not believed to be exploitable).
 
Old 02-07-2023, 02:43 PM   #21
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 018 (all architectures):
A malicious certificate revocation list or timestamp response token would allow an attacker to read arbitrary memory.

Syspatch 019 (all architectures):
CVE-2023-0494: use after free in the Xinput X server extension.

Syspatch 020 (all architectures):
smtpd(8) could abort due to a connection from a local, scoped ipv6 address.
 
Old 02-27-2023, 04:04 AM   #22
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 021 (all architectures):
Missing bounds check in console terminal emulation could cause a kernel crash after receiving specially crafted escape sequences.
 
Old 03-18-2023, 08:51 PM   #23
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 022 (all architectures):
Out of bounds accesses in libc resolver.
 
Old 03-29-2023, 04:03 PM   #24
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 023 (all architectures):
Incorrect length checks allow an out-of-bounds read in bgpd(8).

Syspatch 024 (all architectures):
Xserver, CVE-2023-1393: use after free bug in the Composite server extension.
 
Old 05-27-2023, 07:09 PM   #25
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 025 (all architectures):
IP address inheritance was handled incorrectly in rpki-client(8).

Syspatch 026 (all architectures):
A double free or use after free could occur after SSL_clear(3).
 
Old 06-24-2023, 06:53 PM   #26
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 027 (all architectures):
libX11 CVE-2023-3138 Missing checks in XQueryExtension() return values.
 
Old 07-12-2023, 09:26 AM   #27
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 028 (all architectures):
Incorrect length handling of path attributes in bgpd(8) can lead to a session reset.

Syspatch 029 (all architectures):
A malformed HTTP request can crash httpd(8), if fastcgi is in use.

Syspatch 030 (all architectures):
Incomplete validation of ELF headers in execve(2).

Syspatch 031 (all architectures):
When tracking nexthops over IPv6 multipath routes, or when receiving a NOTIFICATION while reaching an internal limit, bgpd(8) could crash.
 
Old 07-19-2023, 04:03 PM   #28
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 032 (all architectures):
In ssh-agent(1)'s PKCS#11 provider support, remote execution was possible due to controllable access in low-quality libraries. In addition to fixing this, the ability to remotely load PKCS#11 libraries is now disabled by default (re-enable with '-Oallow-remote-pkcs11').
 
Old 07-24-2023, 10:23 PM   #29
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
AMD has a fuckup again. OpenBSD fixed it.

Syspatch 033 (amd64, i386):
Workaround for Zenbleed AMD cpu problem. For i386 and amd64 platforms.

Syspatch 034 (amd64, i386):
Add firmware for AMD cpus, to repair past or potential future bugs. For i386 and amd64 platforms.
After this step, "fw_update" and "installboot" must be run.

Syspatch 035 (amd64, i386):
Install firmware updates for AMD cpus, to repair past or potential future bugs. For i386 and amd64 platforms.

Syspatch 036 (all architectures):
Missing bounds check in console terminal emulation could cause a kernel crash after receiving specially crafted escape sequences.
 
Old 07-25-2023, 07:08 PM   #30
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Original Poster
Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Syspatch 037 (amd64, i386):
Some hypervisors remain unpatched for writes to Zenbleed DE_CFG bit, so skip it.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
OpenBSD: nvidia drivers, screen resolution and FreeBSD binaries on OpenBSD ::: *BSD 2 08-21-2009 04:18 AM
LXer: Fsck errors in the Linux filesystem on my OpenBSD laptop NOT caused by OpenBSD LXer Syndicated Linux News 1 08-31-2008 03:15 AM
LXer: OpenBSD: The OpenBSD Foundation LXer Syndicated Linux News 0 07-26-2007 10:31 AM
OpenBSD - Where can i get OpenBSD 3.7 ISO CD -- Please help me b:z Linux - Software 5 04-08-2005 07:09 AM
OpenBSD - Where can i get OpenBSD 3.7 ISO CD -- Please help me b:z Linux - Software 1 04-07-2005 08:46 AM

LinuxQuestions.org > Forums > Other *NIX Forums > *BSD

All times are GMT -5. The time now is 02:20 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration