===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata43.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -c -r1.43 -r1.44
*** www/errata43.html 2014/10/02 14:34:45 1.43
--- www/errata43.html 2015/02/14 04:36:51 1.44
***************
*** 82,88 ****
! -
013: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
--- 82,88 ----
! -
013: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
***************
*** 103,109 ****
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
--- 103,109 ----
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
***************
*** 121,127 ****
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: February 22, 2009
All architectures
sudo(8) may allow a user listed in the sudoers file to run a command
--- 121,127 ----
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: February 22, 2009
All architectures
sudo(8) may allow a user listed in the sudoers file to run a command
***************
*** 134,140 ****
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: February 18, 2009
All architectures
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
--- 134,140 ----
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: February 18, 2009
All architectures
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
***************
*** 144,150 ****
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: January 30, 2009
All architectures
Upon reception of an invalid update with 4-byte AS attributes, bgpd -
--- 144,150 ----
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: January 30, 2009
All architectures
Upon reception of an invalid update with 4-byte AS attributes, bgpd -
***************
*** 157,163 ****
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: January 14, 2009
All architectures
named(8) did not correctly check the return value of a DSA verification
--- 157,163 ----
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: January 14, 2009
All architectures
named(8) did not correctly check the return value of a DSA verification
***************
*** 169,175 ****
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: January 9, 2009
All architectures
The OpenSSL libraries did not correctly check the return value from
--- 169,175 ----
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: January 9, 2009
All architectures
The OpenSSL libraries did not correctly check the return value from
***************
*** 183,189 ****
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: October 2, 2008
All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
--- 183,189 ----
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: October 2, 2008
All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
***************
*** 196,202 ****
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: July 29, 2008
All architectures
Some kinds of IPv6 usage would leak kernel memory (in particular, this path
--- 196,202 ----
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: July 29, 2008
All architectures
Some kinds of IPv6 usage would leak kernel memory (in particular, this path
***************
*** 207,213 ****
A source code patch exists which remedies this problem.
!
-
004: SECURITY FIX: July 23, 2008
All architectures
2nd revision, July 23, 2008
--- 207,213 ----
A source code patch exists which remedies this problem.
!
-
004: SECURITY FIX: July 23, 2008
All architectures
2nd revision, July 23, 2008
***************
*** 219,225 ****
A source code patch exists which remedies this problem.
!
-
003: SECURITY FIX: July 15, 2008
All architectures
Multiple vulnerabilities have been discovered in X.Org.
--- 219,225 ----
A source code patch exists which remedies this problem.
!
-
003: SECURITY FIX: July 15, 2008
All architectures
Multiple vulnerabilities have been discovered in X.Org.
***************
*** 238,244 ****
A source code patch exists which remedies this problem.
!
-
002: SECURITY FIX: April 3, 2008
All architectures
Avoid possible hijacking of X11-forwarded connections with sshd(8)
--- 238,244 ----
A source code patch exists which remedies this problem.
!
-
002: SECURITY FIX: April 3, 2008
All architectures
Avoid possible hijacking of X11-forwarded connections with sshd(8)
***************
*** 248,254 ****
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: March 30, 2008
All architectures
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) ForceCommand
--- 248,254 ----
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: March 30, 2008
All architectures
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) ForceCommand