===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -c -r1.58 -r1.59
*** www/errata44.html 2017/03/28 04:04:52 1.58
--- www/errata44.html 2017/03/28 06:41:18 1.59
***************
*** 82,88 ****
! -
016: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
--- 82,88 ----
! -
016: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
***************
*** 92,98 ****
A source code patch exists which remedies this problem.
!
-
015: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
--- 92,98 ----
A source code patch exists which remedies this problem.
!
-
015: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
***************
*** 101,107 ****
A source code patch exists which remedies this problem.
!
-
014: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
--- 101,107 ----
A source code patch exists which remedies this problem.
!
-
014: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
***************
*** 113,119 ****
A source code patch exists which remedies this problem.
!
-
013: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
--- 113,119 ----
A source code patch exists which remedies this problem.
!
-
013: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
***************
*** 134,140 ****
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
--- 134,140 ----
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
***************
*** 152,158 ****
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: February 22, 2009
All architectures
sudo(8) may allow a user listed in the sudoers file to run a command
--- 152,158 ----
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: February 22, 2009
All architectures
sudo(8) may allow a user listed in the sudoers file to run a command
***************
*** 165,171 ****
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: February 18, 2009
All architectures
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
--- 165,171 ----
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: February 18, 2009
All architectures
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
***************
*** 175,181 ****
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: January 30, 2009
All architectures
Upon reception of an invalid update with 4-byte AS attributes, bgpd -
--- 175,181 ----
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: January 30, 2009
All architectures
Upon reception of an invalid update with 4-byte AS attributes, bgpd -
***************
*** 188,194 ****
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: January 14, 2009
All architectures
named(8) did not correctly check the return value of a DSA verification
--- 188,194 ----
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: January 14, 2009
All architectures
named(8) did not correctly check the return value of a DSA verification
***************
*** 200,206 ****
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: January 9, 2009
All architectures
The OpenSSL libraries did not correctly check the return value from
--- 200,206 ----
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: January 9, 2009
All architectures
The OpenSSL libraries did not correctly check the return value from
***************
*** 214,220 ****
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: November 19, 2008
All architectures
Due to changes in the options handling this caused problems with some
--- 214,220 ----
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: November 19, 2008
All architectures
Due to changes in the options handling this caused problems with some
***************
*** 225,231 ****
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: November 7, 2008
All architectures
A software bug could cause memory allocation to cause a kernel panic
--- 225,231 ----
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: November 7, 2008
All architectures
A software bug could cause memory allocation to cause a kernel panic
***************
*** 235,245 ****
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: November 6, 2008
All architectures
Fix
! httpd(8)'s
mod_proxy module which is broken on 64-bit architectures. Due to the bug this
will result in child processes crashing when utilizing proxy rules during an
HTTP session.
--- 235,245 ----
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: November 6, 2008
All architectures
Fix
! httpd(8)'s
mod_proxy module which is broken on 64-bit architectures. Due to the bug this
will result in child processes crashing when utilizing proxy rules during an
HTTP session.
***************
*** 248,254 ****
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: November 6, 2008
All architectures
Fix the IPv4 TCP/IP stack's TIME_WAIT socket recycling. Due to the bug this
--- 248,254 ----
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: November 6, 2008
All architectures
Fix the IPv4 TCP/IP stack's TIME_WAIT socket recycling. Due to the bug this
***************
*** 259,265 ****
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: November 2, 2008
All architectures
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
--- 259,265 ----
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: November 2, 2008
All architectures
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
***************
*** 269,275 ****
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: November 2, 2008
All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
--- 269,275 ----
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: November 2, 2008
All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor