===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -r1.55 -r1.56
--- www/errata44.html 2016/08/15 02:22:06 1.55
+++ www/errata44.html 2016/10/16 19:11:30 1.56
@@ -68,7 +68,7 @@
@@ -90,7 +90,7 @@
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
IP_IPCOMP_LEVEL will crash the system.
-
+
A source code patch exists which remedies this problem.
@@ -99,7 +99,7 @@
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
-
+
A source code patch exists which remedies this problem.
@@ -111,7 +111,7 @@
An attacker could crash a server with a specially crafted dynamic update message to a
zone for which the server is master.
-
+
A source code patch exists which remedies this problem.
@@ -132,7 +132,7 @@
nat/rdr ... inet6 proto { tcp udp icmp6 } ...- + A source code patch exists which remedies this problem.
@@ -150,7 +150,7 @@
OpenSSL security advisory, but note that the other issue described there "Incorrect Error
Checking During CMS verification" relates to code not enabled in OpenBSD.
-
+
A source code patch exists which remedies this problem.
@@ -163,7 +163,7 @@
when the user being granted privileges is also a member of the group
in the RunAs portion of the rule.
-
+
A source code patch exists which remedies this problem.
@@ -173,7 +173,7 @@
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
the process to terminate because of the resulting corrupt path.
-
+
A source code patch exists which remedies this problem.
@@ -186,7 +186,7 @@
sessions.
In the worst case Internet connectivity could be lost.
-
+
A source code patch exists which remedies this problem.
@@ -198,7 +198,7 @@
signatures.
CVE-2009-0025.
-
+
A source code patch exists which remedies this problem.
@@ -212,7 +212,7 @@
certificate.
CVE-2008-5077.
-
+
A source code patch exists which remedies this problem.
@@ -223,7 +223,7 @@
DHCP clients such as Solaris/OpenSolaris and some embedded routers not
accepting DHCP offers.
-
+
A source code patch exists which remedies this problem.
@@ -233,7 +233,7 @@
A software bug could cause memory allocation to cause a kernel panic
accessing an array out of its bounds, when physical memory is exhausted.
-
+
A source code patch exists which remedies this problem.
@@ -246,7 +246,7 @@
will result in child processes crashing when utilizing proxy rules during an
HTTP session.
-
+
A source code patch exists which remedies this problem.
@@ -257,7 +257,7 @@
can result in TCP connections between two IPs being reset instead of accepted
if being received on a socket in the TIME_WAIT state.
-
+
A source code patch exists which remedies this problem.
@@ -267,7 +267,7 @@
Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
driver to panic under heavy load if the RX path runs out of mbufs.
-
+
A source code patch exists which remedies this problem.
@@ -280,7 +280,7 @@
this vulnerability to be exploited.
CVE-2008-2476.
-
+
A source code patch exists which remedies this problem.