=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata45.html,v retrieving revision 1.52 retrieving revision 1.53 diff -u -r1.52 -r1.53 --- www/errata45.html 2016/08/15 02:22:06 1.52 +++ www/errata45.html 2016/10/16 19:11:30 1.53 @@ -70,7 +70,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

@@ -92,7 +92,7 @@ In TLS connections, certain incorrectly formatted records can cause an OpenSSL client or server to crash due to a read attempt at NULL.
- + A source code patch exists which remedies this problem.

@@ -107,7 +107,7 @@ leading to a denial of service when a resource limit is apparently reached.
- + A source code patch exists which remedies this problem.

@@ -118,7 +118,7 @@ paranoid enough in checking for underruns, which could potentially lead to crashes.
- + A source code patch exists which remedies this problem.

@@ -128,7 +128,7 @@ Due to a null pointer dereference, it would be possible to crash ftpd when handling glob(3)'ing requests. This is non-exploitable.
- + A source code patch exists which remedies this problem.

@@ -138,7 +138,7 @@ OpenSSL is susceptible to a buffer overflow due to a failure to check for NULL returns from bn_wexpand function calls.
- + A source code patch exists which remedies this problem.

@@ -149,7 +149,7 @@ could be created, violating assumptions in other parts of the kernel and resulting in infinite loops.
- + A source code patch exists which remedies this problem.

@@ -161,7 +161,7 @@ OpenSSL permitted this protocol feature by default and had no way to disable it.
- + A source code patch exists which remedies this problem.

@@ -171,7 +171,7 @@ getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, IP_IPCOMP_LEVEL will crash the system.
- + A source code patch exists which remedies this problem.

@@ -180,7 +180,7 @@   i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
- + A source code patch exists which remedies this problem.

@@ -192,7 +192,7 @@ An attacker could crash a server with a specially crafted dynamic update message to a zone for which the server is master.
- + A source code patch exists which remedies this problem.

@@ -206,7 +206,7 @@ (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow.
- + A source code patch exists which remedies this problem.

@@ -221,7 +221,7 @@ driver causing the audio application to go out of sync, and in turn causing continuous stuttering until the application is restarted.
- + A source code patch exists which remedies this problem.

@@ -234,7 +234,7 @@ to think that buffer underruns are occuring. Depending on the application, this may cause the sound to stutter.
- + A source code patch exists which remedies this problem.

@@ -248,7 +248,7 @@ to stutter, but other anomalies might be observed for other device types.
- + A source code patch exists which remedies this problem.

@@ -269,7 +269,7 @@

     nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 
- + A source code patch exists which remedies this problem.

@@ -287,7 +287,7 @@ OpenSSL security advisory, but note that the other issue described there "Incorrect Error Checking During CMS verification" relates to code not enabled in OpenBSD.
- + A source code patch exists which remedies this problem.