=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v retrieving revision 1.55 retrieving revision 1.56 diff -u -r1.55 -r1.56 --- www/errata44.html 2016/08/15 02:22:06 1.55 +++ www/errata44.html 2016/10/16 19:11:30 1.56 @@ -68,7 +68,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

@@ -90,7 +90,7 @@ getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, IP_IPCOMP_LEVEL will crash the system.
- + A source code patch exists which remedies this problem.

@@ -99,7 +99,7 @@   i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
- + A source code patch exists which remedies this problem.

@@ -111,7 +111,7 @@ An attacker could crash a server with a specially crafted dynamic update message to a zone for which the server is master.
- + A source code patch exists which remedies this problem.

@@ -132,7 +132,7 @@

     nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 
- + A source code patch exists which remedies this problem.

@@ -150,7 +150,7 @@ OpenSSL security advisory, but note that the other issue described there "Incorrect Error Checking During CMS verification" relates to code not enabled in OpenBSD.
- + A source code patch exists which remedies this problem.

@@ -163,7 +163,7 @@ when the user being granted privileges is also a member of the group in the RunAs portion of the rule.
- + A source code patch exists which remedies this problem.

@@ -173,7 +173,7 @@ bgpd(8) did not correctly prepend its own AS to very long AS paths, causing the process to terminate because of the resulting corrupt path.
- + A source code patch exists which remedies this problem.

@@ -186,7 +186,7 @@ sessions. In the worst case Internet connectivity could be lost.
- + A source code patch exists which remedies this problem.

@@ -198,7 +198,7 @@ signatures. CVE-2009-0025.
- + A source code patch exists which remedies this problem.

@@ -212,7 +212,7 @@ certificate. CVE-2008-5077.
- + A source code patch exists which remedies this problem.

@@ -223,7 +223,7 @@ DHCP clients such as Solaris/OpenSolaris and some embedded routers not accepting DHCP offers.
- + A source code patch exists which remedies this problem.

@@ -233,7 +233,7 @@ A software bug could cause memory allocation to cause a kernel panic accessing an array out of its bounds, when physical memory is exhausted.
- + A source code patch exists which remedies this problem.

@@ -246,7 +246,7 @@ will result in child processes crashing when utilizing proxy rules during an HTTP session.
- + A source code patch exists which remedies this problem.

@@ -257,7 +257,7 @@ can result in TCP connections between two IPs being reset instead of accepted if being received on a socket in the TIME_WAIT state.
- + A source code patch exists which remedies this problem.

@@ -267,7 +267,7 @@ Due to a bug in the vr(4) driver it is possible for a system using the vr(4) driver to panic under heavy load if the RX path runs out of mbufs.
- + A source code patch exists which remedies this problem.

@@ -280,7 +280,7 @@ this vulnerability to be exploited. CVE-2008-2476.
- + A source code patch exists which remedies this problem.