===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata46.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -r1.16 -r1.17
--- www/errata46.html 2010/06/08 01:49:35 1.16
+++ www/errata46.html 2010/07/08 19:00:07 1.17
@@ -53,7 +53,7 @@
@@ -99,7 +99,7 @@
011: RELIABILITY FIX: May 14, 2010 All architectures
Incorrectly initialized state updates can cause pfsync update storms.
-
+
A source code patch exists which remedies this problem.
@@ -108,7 +108,7 @@
In TLS connections, certain incorrectly formatted records can cause
an OpenSSL client or server to crash due to a read attempt at NULL.
-
+
A source code patch exists which remedies this problem.
@@ -122,7 +122,7 @@
leading to a denial of service when a resource limit is apparently
reached.
-
+
A source code patch exists which remedies this problem.
@@ -132,7 +132,7 @@
paranoid enough in checking for underruns, which could potentially
lead to crashes.
-
+
A source code patch exists which remedies this problem.
@@ -141,7 +141,7 @@
Due to a null pointer dereference, it would be possible to crash ftpd when
handling glob(3)'ing requests. This is non-exploitable.
-
+
A source code patch exists which remedies this problem.
@@ -150,7 +150,7 @@
OpenSSL is susceptible to a buffer overflow due to a failure
to check for NULL returns from bn_wexpand function calls.
-
+
A source code patch exists which remedies this problem.
@@ -160,7 +160,7 @@
could be created, violating assumptions in other parts of the kernel
and resulting in infinite loops.
-
+
A source code patch exists which remedies this problem.
@@ -171,7 +171,7 @@
OpenSSL permitted this protocol feature by default and had no way to
disable it.
-
+
A source code patch exists which remedies this problem.
@@ -180,7 +180,7 @@
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
IP_IPCOMP_LEVEL will crash the system.
-
+
A source code patch exists which remedies this problem.
@@ -188,7 +188,7 @@
002: RELIABILITY FIX: October 05, 2009 i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
-
+
A source code patch exists which remedies this problem.
@@ -199,7 +199,7 @@
An attacker could crash a server with a specially crafted dynamic update message to a
zone for which the server is master.
-
+
A source code patch exists which remedies this problem.
@@ -240,7 +240,7 @@