=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v retrieving revision 1.26 retrieving revision 1.27 diff -c -r1.26 -r1.27 *** www/errata44.html 2010/03/08 21:53:37 1.26 --- www/errata44.html 2010/07/08 19:00:07 1.27 *************** *** 54,60 ****

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. --- 54,60 ----

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. *************** *** 92,98 **** getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, IP_IPCOMP_LEVEL will crash the system.
! A source code patch exists which remedies this problem.

--- 92,98 ---- getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, IP_IPCOMP_LEVEL will crash the system.
! A source code patch exists which remedies this problem.

*************** *** 100,106 **** 015: RELIABILITY FIX: October 05, 2009   i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
! A source code patch exists which remedies this problem.

--- 100,106 ---- 015: RELIABILITY FIX: October 05, 2009   i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
! A source code patch exists which remedies this problem.

*************** *** 111,117 **** An attacker could crash a server with a specially crafted dynamic update message to a zone for which the server is master.
! A source code patch exists which remedies this problem.

--- 111,117 ---- An attacker could crash a server with a specially crafted dynamic update message to a zone for which the server is master.
! A source code patch exists which remedies this problem.

*************** *** 131,137 ****

      nat/rdr ... inet6 proto { tcp udp icmp6 } ...
  
! A source code patch exists which remedies this problem.

--- 131,137 ----

      nat/rdr ... inet6 proto { tcp udp icmp6 } ...
  
! A source code patch exists which remedies this problem.

*************** *** 148,154 **** OpenSSL security advisory, but note that the other issue described there "Incorrect Error Checking During CMS verification" relates to code not enabled in OpenBSD.
! A source code patch exists which remedies this problem.

--- 148,154 ---- OpenSSL security advisory, but note that the other issue described there "Incorrect Error Checking During CMS verification" relates to code not enabled in OpenBSD.
! A source code patch exists which remedies this problem.

*************** *** 160,166 **** when the user being granted privileges is also a member of the group in the RunAs portion of the rule.
! A source code patch exists which remedies this problem.

--- 160,166 ---- when the user being granted privileges is also a member of the group in the RunAs portion of the rule.
! A source code patch exists which remedies this problem.

*************** *** 169,175 **** bgpd(8) did not correctly prepend its own AS to very long AS paths, causing the process to terminate because of the resulting corrupt path.
! A source code patch exists which remedies this problem.

--- 169,175 ---- bgpd(8) did not correctly prepend its own AS to very long AS paths, causing the process to terminate because of the resulting corrupt path.
! A source code patch exists which remedies this problem.

*************** *** 181,187 **** sessions. In the worst case Internet connectivity could be lost.
! A source code patch exists which remedies this problem.

--- 181,187 ---- sessions. In the worst case Internet connectivity could be lost.
! A source code patch exists which remedies this problem.

*************** *** 192,198 **** signatures. CVE-2009-0025.
! A source code patch exists which remedies this problem.

--- 192,198 ---- signatures. CVE-2009-0025.
! A source code patch exists which remedies this problem.

*************** *** 205,211 **** certificate. CVE-2008-5077.
! A source code patch exists which remedies this problem.

--- 205,211 ---- certificate. CVE-2008-5077.
! A source code patch exists which remedies this problem.

*************** *** 215,221 **** DHCP clients such as Solaris/OpenSolaris and some embedded routers not accepting DHCP offers.
! A source code patch exists which remedies this problem.

--- 215,221 ---- DHCP clients such as Solaris/OpenSolaris and some embedded routers not accepting DHCP offers.
! A source code patch exists which remedies this problem.

*************** *** 224,230 **** A software bug could cause memory allocation to cause a kernel panic accessing an array out of its bounds, when physical memory is exhausted.
! A source code patch exists which remedies this problem.

--- 224,230 ---- A software bug could cause memory allocation to cause a kernel panic accessing an array out of its bounds, when physical memory is exhausted.
! A source code patch exists which remedies this problem.

*************** *** 236,242 **** will result in child processes crashing when utilizing proxy rules during an HTTP session.
! A source code patch exists which remedies this problem.

--- 236,242 ---- will result in child processes crashing when utilizing proxy rules during an HTTP session.
! A source code patch exists which remedies this problem.

*************** *** 246,252 **** can result in TCP connections between two IPs being reset instead of accepted if being received on a socket in the TIME_WAIT state.
! A source code patch exists which remedies this problem.

--- 246,252 ---- can result in TCP connections between two IPs being reset instead of accepted if being received on a socket in the TIME_WAIT state.
! A source code patch exists which remedies this problem.

*************** *** 255,261 **** Due to a bug in the vr(4) driver it is possible for a system using the vr(4) driver to panic under heavy load if the RX path runs out of mbufs.
! A source code patch exists which remedies this problem.

--- 255,261 ---- Due to a bug in the vr(4) driver it is possible for a system using the vr(4) driver to panic under heavy load if the RX path runs out of mbufs.
! A source code patch exists which remedies this problem.

*************** *** 267,273 **** this vulnerability to be exploited. CVE-2008-2476.
! A source code patch exists which remedies this problem.

--- 267,273 ---- this vulnerability to be exploited. CVE-2008-2476.
! A source code patch exists which remedies this problem.

*************** *** 310,316 ****


OpenBSD www@openbsd.org !
$OpenBSD: errata44.html,v 1.26 2010/03/08 21:53:37 deraadt Exp $ --- 310,316 ----
OpenBSD www@openbsd.org !
$OpenBSD: errata44.html,v 1.27 2010/07/08 19:00:07 sthen Exp $