===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -c -r1.42 -r1.43
*** www/errata44.html 2014/10/02 14:34:45 1.42
--- www/errata44.html 2015/02/14 04:36:51 1.43
***************
*** 81,87 ****
! -
016: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
--- 81,87 ----
! -
016: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
***************
*** 91,97 ****
A source code patch exists which remedies this problem.
!
-
015: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
--- 91,97 ----
A source code patch exists which remedies this problem.
!
-
015: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
***************
*** 100,106 ****
A source code patch exists which remedies this problem.
!
-
014: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
--- 100,106 ----
A source code patch exists which remedies this problem.
!
-
014: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
***************
*** 112,118 ****
A source code patch exists which remedies this problem.
!
-
013: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
--- 112,118 ----
A source code patch exists which remedies this problem.
!
-
013: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
***************
*** 133,139 ****
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
--- 133,139 ----
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
***************
*** 151,157 ****
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: February 22, 2009
All architectures
sudo(8) may allow a user listed in the sudoers file to run a command
--- 151,157 ----
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: February 22, 2009
All architectures
sudo(8) may allow a user listed in the sudoers file to run a command
***************
*** 164,170 ****
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: February 18, 2009
All architectures
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
--- 164,170 ----
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: February 18, 2009
All architectures
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
***************
*** 174,180 ****
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: January 30, 2009
All architectures
Upon reception of an invalid update with 4-byte AS attributes, bgpd -
--- 174,180 ----
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: January 30, 2009
All architectures
Upon reception of an invalid update with 4-byte AS attributes, bgpd -
***************
*** 187,193 ****
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: January 14, 2009
All architectures
named(8) did not correctly check the return value of a DSA verification
--- 187,193 ----
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: January 14, 2009
All architectures
named(8) did not correctly check the return value of a DSA verification
***************
*** 199,205 ****
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: January 9, 2009
All architectures
The OpenSSL libraries did not correctly check the return value from
--- 199,205 ----
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: January 9, 2009
All architectures
The OpenSSL libraries did not correctly check the return value from
***************
*** 213,219 ****
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: November 19, 2008
All architectures
Due to changes in the options handling this caused problems with some
--- 213,219 ----
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: November 19, 2008
All architectures
Due to changes in the options handling this caused problems with some
***************
*** 224,230 ****
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: November 7, 2008
All architectures
A software bug could cause memory allocation to cause a kernel panic
--- 224,230 ----
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: November 7, 2008
All architectures
A software bug could cause memory allocation to cause a kernel panic
***************
*** 234,240 ****
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: November 6, 2008
All architectures
Fix
--- 234,240 ----
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: November 6, 2008
All architectures
Fix
***************
*** 247,253 ****
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: November 6, 2008
All architectures
Fix the IPv4 TCP/IP stack's TIME_WAIT socket recycling. Due to the bug this
--- 247,253 ----
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: November 6, 2008
All architectures
Fix the IPv4 TCP/IP stack's TIME_WAIT socket recycling. Due to the bug this
***************
*** 258,264 ****
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: November 2, 2008
All architectures
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
--- 258,264 ----
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: November 2, 2008
All architectures
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
***************
*** 268,274 ****
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: November 2, 2008
All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
--- 268,274 ----
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: November 2, 2008
All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor