===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata43.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -c -r1.57 -r1.58
*** www/errata43.html 2017/03/28 04:04:52 1.57
--- www/errata43.html 2017/03/28 06:41:18 1.58
***************
*** 83,89 ****
! -
013: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
--- 83,89 ----
! -
013: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
***************
*** 104,110 ****
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
--- 104,110 ----
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
***************
*** 122,128 ****
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: February 22, 2009
All architectures
sudo(8) may allow a user listed in the sudoers file to run a command
--- 122,128 ----
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: February 22, 2009
All architectures
sudo(8) may allow a user listed in the sudoers file to run a command
***************
*** 135,141 ****
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: February 18, 2009
All architectures
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
--- 135,141 ----
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: February 18, 2009
All architectures
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
***************
*** 145,151 ****
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: January 30, 2009
All architectures
Upon reception of an invalid update with 4-byte AS attributes, bgpd -
--- 145,151 ----
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: January 30, 2009
All architectures
Upon reception of an invalid update with 4-byte AS attributes, bgpd -
***************
*** 158,164 ****
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: January 14, 2009
All architectures
named(8) did not correctly check the return value of a DSA verification
--- 158,164 ----
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: January 14, 2009
All architectures
named(8) did not correctly check the return value of a DSA verification
***************
*** 170,176 ****
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: January 9, 2009
All architectures
The OpenSSL libraries did not correctly check the return value from
--- 170,176 ----
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: January 9, 2009
All architectures
The OpenSSL libraries did not correctly check the return value from
***************
*** 184,190 ****
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: October 2, 2008
All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
--- 184,190 ----
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: October 2, 2008
All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
***************
*** 197,203 ****
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: July 29, 2008
All architectures
Some kinds of IPv6 usage would leak kernel memory (in particular, this path
--- 197,203 ----
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: July 29, 2008
All architectures
Some kinds of IPv6 usage would leak kernel memory (in particular, this path
***************
*** 208,214 ****
A source code patch exists which remedies this problem.
!
-
004: SECURITY FIX: July 23, 2008
All architectures
2nd revision, July 23, 2008
--- 208,214 ----
A source code patch exists which remedies this problem.
!
-
004: SECURITY FIX: July 23, 2008
All architectures
2nd revision, July 23, 2008
***************
*** 220,226 ****
A source code patch exists which remedies this problem.
!
-
003: SECURITY FIX: July 15, 2008
All architectures
Multiple vulnerabilities have been discovered in X.Org.
--- 220,226 ----
A source code patch exists which remedies this problem.
!
-
003: SECURITY FIX: July 15, 2008
All architectures
Multiple vulnerabilities have been discovered in X.Org.
***************
*** 239,245 ****
A source code patch exists which remedies this problem.
!
-
002: SECURITY FIX: April 3, 2008
All architectures
Avoid possible hijacking of X11-forwarded connections with sshd(8)
--- 239,245 ----
A source code patch exists which remedies this problem.
!
-
002: SECURITY FIX: April 3, 2008
All architectures
Avoid possible hijacking of X11-forwarded connections with sshd(8)
***************
*** 249,255 ****
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: March 30, 2008
All architectures
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) ForceCommand
--- 249,255 ----
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: March 30, 2008
All architectures
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) ForceCommand