=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata56.html,v retrieving revision 1.7 retrieving revision 1.8 diff -u -r1.7 -r1.8 --- www/errata56.html 2014/11/17 19:55:00 1.7 +++ www/errata56.html 2014/11/17 19:58:52 1.8 @@ -150,14 +150,23 @@

  • -007: SECURITY FIX: November 17, 2014 +007: RELIABILITY FIX: November 17, 2014   All architectures
    -PF rules of the form "pass from {192.0.2.1 2001:db8::1} to (pppoe0)" will -apply an incorrect /32 mask to the dynamic IPv6 address, allowing access to -a wide address range rather than the intended single host. -As a workaround, list the IPv4 address last, i.e. "{2001:db8::1 192.0.2.1}". +A PF rule using an IPv4 address +followed by an IPv6 address and then a dynamic address, e.g. "pass +from {192.0.2.1 2001:db8::1} to (pppoe0)", will have an incorrect /32 +mask applied to the dynamic address.
    +A source code patch exists which remedies this problem. +

    + +

  • +008: RELIABILITY FIX: November 17, 2014All architectures
    +Querying an invalid hostname with gethostbyname(3) could cause a NULL deref. +
    + A source code patch exists which remedies this problem.