===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -c -r1.55 -r1.56
*** www/errata44.html 2016/08/15 02:22:06 1.55
--- www/errata44.html 2016/10/16 19:11:30 1.56
***************
*** 68,74 ****
--- 68,74 ----
***************
*** 90,96 ****
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
IP_IPCOMP_LEVEL will crash the system.
!
A source code patch exists which remedies this problem.
--- 90,96 ----
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
IP_IPCOMP_LEVEL will crash the system.
!
A source code patch exists which remedies this problem.
***************
*** 99,105 ****
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
!
A source code patch exists which remedies this problem.
--- 99,105 ----
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
!
A source code patch exists which remedies this problem.
***************
*** 111,117 ****
An attacker could crash a server with a specially crafted dynamic update message to a
zone for which the server is master.
!
A source code patch exists which remedies this problem.
--- 111,117 ----
An attacker could crash a server with a specially crafted dynamic update message to a
zone for which the server is master.
!
A source code patch exists which remedies this problem.
*************** *** 132,138 ****
nat/rdr ... inet6 proto { tcp udp icmp6 } ...! A source code patch exists which remedies this problem.
--- 132,138 ----
nat/rdr ... inet6 proto { tcp udp icmp6 } ...! A source code patch exists which remedies this problem.
***************
*** 150,156 ****
OpenSSL security advisory, but note that the other issue described there "Incorrect Error
Checking During CMS verification" relates to code not enabled in OpenBSD.
!
A source code patch exists which remedies this problem.
--- 150,156 ----
OpenSSL security advisory, but note that the other issue described there "Incorrect Error
Checking During CMS verification" relates to code not enabled in OpenBSD.
!
A source code patch exists which remedies this problem.
***************
*** 163,169 ****
when the user being granted privileges is also a member of the group
in the RunAs portion of the rule.
!
A source code patch exists which remedies this problem.
--- 163,169 ----
when the user being granted privileges is also a member of the group
in the RunAs portion of the rule.
!
A source code patch exists which remedies this problem.
***************
*** 173,179 ****
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
the process to terminate because of the resulting corrupt path.
!
A source code patch exists which remedies this problem.
--- 173,179 ----
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
the process to terminate because of the resulting corrupt path.
!
A source code patch exists which remedies this problem.
***************
*** 186,192 ****
sessions.
In the worst case Internet connectivity could be lost.
!
A source code patch exists which remedies this problem.
--- 186,192 ----
sessions.
In the worst case Internet connectivity could be lost.
!
A source code patch exists which remedies this problem.
***************
*** 198,204 ****
signatures.
CVE-2009-0025.
!
A source code patch exists which remedies this problem.
--- 198,204 ----
signatures.
CVE-2009-0025.
!
A source code patch exists which remedies this problem.
***************
*** 212,218 ****
certificate.
CVE-2008-5077.
!
A source code patch exists which remedies this problem.
--- 212,218 ----
certificate.
CVE-2008-5077.
!
A source code patch exists which remedies this problem.
***************
*** 223,229 ****
DHCP clients such as Solaris/OpenSolaris and some embedded routers not
accepting DHCP offers.
!
A source code patch exists which remedies this problem.
--- 223,229 ----
DHCP clients such as Solaris/OpenSolaris and some embedded routers not
accepting DHCP offers.
!
A source code patch exists which remedies this problem.
***************
*** 233,239 ****
A software bug could cause memory allocation to cause a kernel panic
accessing an array out of its bounds, when physical memory is exhausted.
!
A source code patch exists which remedies this problem.
--- 233,239 ----
A software bug could cause memory allocation to cause a kernel panic
accessing an array out of its bounds, when physical memory is exhausted.
!
A source code patch exists which remedies this problem.
***************
*** 246,252 ****
will result in child processes crashing when utilizing proxy rules during an
HTTP session.
!
A source code patch exists which remedies this problem.
--- 246,252 ----
will result in child processes crashing when utilizing proxy rules during an
HTTP session.
!
A source code patch exists which remedies this problem.
***************
*** 257,263 ****
can result in TCP connections between two IPs being reset instead of accepted
if being received on a socket in the TIME_WAIT state.
!
A source code patch exists which remedies this problem.
--- 257,263 ----
can result in TCP connections between two IPs being reset instead of accepted
if being received on a socket in the TIME_WAIT state.
!
A source code patch exists which remedies this problem.
***************
*** 267,273 ****
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
driver to panic under heavy load if the RX path runs out of mbufs.
!
A source code patch exists which remedies this problem.
--- 267,273 ----
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
driver to panic under heavy load if the RX path runs out of mbufs.
!
A source code patch exists which remedies this problem.
***************
*** 280,286 ****
this vulnerability to be exploited.
CVE-2008-2476.
!
A source code patch exists which remedies this problem.
--- 280,286 ----
this vulnerability to be exploited.
CVE-2008-2476.
!
A source code patch exists which remedies this problem.