Return to errata74.html CVS log | Up to [local] / www |
version 1.2, 2023/10/25 08:31:32 | version 1.3, 2023/11/20 19:03:30 | ||
---|---|---|---|
|
|
||
A source code patch exists which remedies this problem.</a> | A source code patch exists which remedies this problem.</a> | ||
<p> | <p> | ||
<li id="p003_patch"> | |||
<strong>003: RELIABILITY FIX: November 21, 2023</strong> | |||
<i>All architectures</i> | |||
<br> | |||
patch(1) with explicit patchfile did not work in 7.4 due to overeager | |||
unveil(2) restrictions. | |||
<br> | |||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/003_patch.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
<li id="p004_ospfd"> | |||
<strong>004: RELIABILITY FIX: November 21, 2023</strong> | |||
<i>All architectures</i> | |||
<br> | |||
Simple passwords which were 8 characters long caused ospfd(8) to | |||
send out packets with invalid checksum. | |||
<br> | |||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/004_ospfd.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
<li id="p005_tmux"> | |||
<strong>005: RELIABILITY FIX: November 21, 2023</strong> | |||
<i>All architectures</i> | |||
<br> | |||
Overlong sequences of UTF-8 combining characters could crash tmux(1). | |||
<br> | |||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/005_tmux.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
<li id="p006_httpd"> | |||
<strong>006: RELIABILITY FIX: November 21, 2023</strong> | |||
<i>All architectures</i> | |||
<br> | |||
httpd(8): Avoid a NULL dereference when handling a malformed fastcgi request. | |||
<br> | |||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/006_httpd.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
</ul> | </ul> | ||
<hr> | <hr> |