=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v retrieving revision 1.26 retrieving revision 1.27 diff -u -r1.26 -r1.27 --- www/errata44.html 2010/03/08 21:53:37 1.26 +++ www/errata44.html 2010/07/08 19:00:07 1.27 @@ -54,7 +54,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. @@ -92,7 +92,7 @@ getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, IP_IPCOMP_LEVEL will crash the system.
- + A source code patch exists which remedies this problem.

@@ -100,7 +100,7 @@ 015: RELIABILITY FIX: October 05, 2009   i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
- + A source code patch exists which remedies this problem.

@@ -111,7 +111,7 @@ An attacker could crash a server with a specially crafted dynamic update message to a zone for which the server is master.
- + A source code patch exists which remedies this problem.

@@ -131,7 +131,7 @@

     nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 
- + A source code patch exists which remedies this problem.

@@ -148,7 +148,7 @@ OpenSSL security advisory, but note that the other issue described there "Incorrect Error Checking During CMS verification" relates to code not enabled in OpenBSD.
- + A source code patch exists which remedies this problem.

@@ -160,7 +160,7 @@ when the user being granted privileges is also a member of the group in the RunAs portion of the rule.
- + A source code patch exists which remedies this problem.

@@ -169,7 +169,7 @@ bgpd(8) did not correctly prepend its own AS to very long AS paths, causing the process to terminate because of the resulting corrupt path.
- + A source code patch exists which remedies this problem.

@@ -181,7 +181,7 @@ sessions. In the worst case Internet connectivity could be lost.
- + A source code patch exists which remedies this problem.

@@ -192,7 +192,7 @@ signatures. CVE-2009-0025.
- + A source code patch exists which remedies this problem.

@@ -205,7 +205,7 @@ certificate. CVE-2008-5077.
- + A source code patch exists which remedies this problem.

@@ -215,7 +215,7 @@ DHCP clients such as Solaris/OpenSolaris and some embedded routers not accepting DHCP offers.
- + A source code patch exists which remedies this problem.

@@ -224,7 +224,7 @@ A software bug could cause memory allocation to cause a kernel panic accessing an array out of its bounds, when physical memory is exhausted.
- + A source code patch exists which remedies this problem.

@@ -236,7 +236,7 @@ will result in child processes crashing when utilizing proxy rules during an HTTP session.
- + A source code patch exists which remedies this problem.

@@ -246,7 +246,7 @@ can result in TCP connections between two IPs being reset instead of accepted if being received on a socket in the TIME_WAIT state.
- + A source code patch exists which remedies this problem.

@@ -255,7 +255,7 @@ Due to a bug in the vr(4) driver it is possible for a system using the vr(4) driver to panic under heavy load if the RX path runs out of mbufs.
- + A source code patch exists which remedies this problem.

@@ -267,7 +267,7 @@ this vulnerability to be exploited. CVE-2008-2476.
- + A source code patch exists which remedies this problem.

@@ -310,7 +310,7 @@


OpenBSD www@openbsd.org -
$OpenBSD: errata44.html,v 1.26 2010/03/08 21:53:37 deraadt Exp $ +
$OpenBSD: errata44.html,v 1.27 2010/07/08 19:00:07 sthen Exp $