Return to errata73.html CVS log | Up to [local] / www |
version 1.5, 2023/06/15 16:37:12 | version 1.6, 2023/07/12 12:50:01 | ||
---|---|---|---|
|
|
||
A source code patch exists which remedies this problem.</a> | A source code patch exists which remedies this problem.</a> | ||
<p> | <p> | ||
<li id="p006_bgpd"> | |||
<strong>006: RELIABILITY FIX: July 12, 2023</strong> | |||
<i>All architectures</i> | |||
<br> | |||
Incorrect length handling of path attributes in bgpd(8) can lead to a | |||
session reset. | |||
<br> | |||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/006_bgpd.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
<li id="p007_httpd"> | |||
<strong>007: RELIABILITY FIX: July 12, 2023</strong> | |||
<i>All architectures</i> | |||
<br> | |||
A malformed HTTP request can crash httpd(8), if fastcgi is in use. | |||
<br> | |||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/007_httpd.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
<li id="p008_elf"> | |||
<strong>008: RELIABILITY FIX: July 12, 2023</strong> | |||
<i>All architectures</i> | |||
<br> | |||
Incomplete validation of ELF headers in execve(2). | |||
<br> | |||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/008_elf.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
<li id="p009_bgpd"> | |||
<strong>009: RELIABILITY FIX: July 12, 2023</strong> | |||
<i>All architectures</i> | |||
<br> | |||
When tracking nexthops over IPv6 multipath routes, or when receiving | |||
a NOTIFICATION while reaching an internal limit, bgpd(8) could crash. | |||
<br> | |||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/009_bgpd.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
</ul> | </ul> | ||
<hr> | <hr> |