===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -c -r1.26 -r1.27
*** www/errata44.html 2010/03/08 21:53:37 1.26
--- www/errata44.html 2010/07/08 19:00:07 1.27
***************
*** 54,60 ****
--- 92,98 ----
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
IP_IPCOMP_LEVEL will crash the system.
!
A source code patch exists which remedies this problem.
***************
*** 100,106 ****
015: RELIABILITY FIX: October 05, 2009 i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
!
A source code patch exists which remedies this problem.
--- 100,106 ----
015: RELIABILITY FIX: October 05, 2009 i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
!
A source code patch exists which remedies this problem.
***************
*** 111,117 ****
An attacker could crash a server with a specially crafted dynamic update message to a
zone for which the server is master.
!
A source code patch exists which remedies this problem.
--- 111,117 ----
An attacker could crash a server with a specially crafted dynamic update message to a
zone for which the server is master.
!
A source code patch exists which remedies this problem.
*************** *** 131,137 ****
nat/rdr ... inet6 proto { tcp udp icmp6 } ...! A source code patch exists which remedies this problem.
--- 131,137 ----
nat/rdr ... inet6 proto { tcp udp icmp6 } ...! A source code patch exists which remedies this problem.
***************
*** 148,154 ****
OpenSSL security advisory, but note that the other issue described there "Incorrect Error
Checking During CMS verification" relates to code not enabled in OpenBSD.
!
A source code patch exists which remedies this problem.
--- 148,154 ----
OpenSSL security advisory, but note that the other issue described there "Incorrect Error
Checking During CMS verification" relates to code not enabled in OpenBSD.
!
A source code patch exists which remedies this problem.
***************
*** 160,166 ****
when the user being granted privileges is also a member of the group
in the RunAs portion of the rule.
!
A source code patch exists which remedies this problem.
--- 160,166 ----
when the user being granted privileges is also a member of the group
in the RunAs portion of the rule.
!
A source code patch exists which remedies this problem.
***************
*** 169,175 ****
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
the process to terminate because of the resulting corrupt path.
!
A source code patch exists which remedies this problem.
--- 169,175 ----
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
the process to terminate because of the resulting corrupt path.
!
A source code patch exists which remedies this problem.
***************
*** 181,187 ****
sessions.
In the worst case Internet connectivity could be lost.
!
A source code patch exists which remedies this problem.
--- 181,187 ----
sessions.
In the worst case Internet connectivity could be lost.
!
A source code patch exists which remedies this problem.
***************
*** 192,198 ****
signatures.
CVE-2009-0025.
!
A source code patch exists which remedies this problem.
--- 192,198 ----
signatures.
CVE-2009-0025.
!
A source code patch exists which remedies this problem.
***************
*** 205,211 ****
certificate.
CVE-2008-5077.
!
A source code patch exists which remedies this problem.
--- 205,211 ----
certificate.
CVE-2008-5077.
!
A source code patch exists which remedies this problem.
***************
*** 215,221 ****
DHCP clients such as Solaris/OpenSolaris and some embedded routers not
accepting DHCP offers.
!
A source code patch exists which remedies this problem.
--- 215,221 ----
DHCP clients such as Solaris/OpenSolaris and some embedded routers not
accepting DHCP offers.
!
A source code patch exists which remedies this problem.
***************
*** 224,230 ****
A software bug could cause memory allocation to cause a kernel panic
accessing an array out of its bounds, when physical memory is exhausted.
!
A source code patch exists which remedies this problem.
--- 224,230 ----
A software bug could cause memory allocation to cause a kernel panic
accessing an array out of its bounds, when physical memory is exhausted.
!
A source code patch exists which remedies this problem.
***************
*** 236,242 ****
will result in child processes crashing when utilizing proxy rules during an
HTTP session.
!
A source code patch exists which remedies this problem.
--- 236,242 ----
will result in child processes crashing when utilizing proxy rules during an
HTTP session.
!
A source code patch exists which remedies this problem.
***************
*** 246,252 ****
can result in TCP connections between two IPs being reset instead of accepted
if being received on a socket in the TIME_WAIT state.
!
A source code patch exists which remedies this problem.
--- 246,252 ----
can result in TCP connections between two IPs being reset instead of accepted
if being received on a socket in the TIME_WAIT state.
!
A source code patch exists which remedies this problem.
***************
*** 255,261 ****
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
driver to panic under heavy load if the RX path runs out of mbufs.
!
A source code patch exists which remedies this problem.
--- 255,261 ----
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
driver to panic under heavy load if the RX path runs out of mbufs.
!
A source code patch exists which remedies this problem.
***************
*** 267,273 ****
this vulnerability to be exploited.
CVE-2008-2476.
!
A source code patch exists which remedies this problem.
--- 267,273 ----
this vulnerability to be exploited.
CVE-2008-2476.
!
A source code patch exists which remedies this problem.
*************** *** 310,316 ****