===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata56.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -r1.47 -r1.48
--- www/errata56.html 2016/08/15 02:22:06 1.47
+++ www/errata56.html 2016/10/16 19:11:30 1.48
@@ -70,7 +70,7 @@
@@ -92,7 +92,7 @@
All architectures
Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4).
-
+
A source code patch exists which remedies this problem.
@@ -106,7 +106,7 @@
# ifconfig em0 -autoconfprivacy- + A source code patch exists which remedies this problem.
@@ -117,7 +117,7 @@
host confusion attacks in some configurations.
This issue was assigned CVE-2014-3616.
-
+
A source code patch exists which remedies this problem.
@@ -126,7 +126,7 @@
All architectures
Executable headers with an unaligned address will trigger a kernel panic.
-
+
A source code patch exists which remedies this problem.
@@ -141,7 +141,7 @@ but we recommend against the continued use of this obsolete protocol.
- + A source code patch exists which remedies this problem.
@@ -150,7 +150,7 @@
All architectures
Certain http requests can crash relayd.
-
+
A source code patch exists which remedies this problem.
@@ -162,7 +162,7 @@
from {192.0.2.1 2001:db8::1} to (pppoe0)", will have an incorrect /32
mask applied to the dynamic address.
-
+
A source code patch exists which remedies this problem.
@@ -171,7 +171,7 @@
All architectures
Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.
-
+
A source code patch exists which remedies this problem.
@@ -184,7 +184,7 @@
want to use it. Therefore here is a "jumbo" patch that brings in the
most important fixes.
-
+
A source code patch exists which remedies this problem.
Unfortunately the source tree found on the CD set contains a slightly different
@@ -199,7 +199,7 @@
Several bugs were fixed that allowed a crash from remote when an active pipex
session exists.
-
+
A source code patch exists which remedies this problem.
@@ -209,7 +209,7 @@
An incorrect memcpy call would result in corrupted MAC addresses when
using PPPOE.
-
+
A source code patch exists which remedies this problem.
@@ -219,7 +219,7 @@
Fix a denial of service where a malicious authority could make the resolver chase an
endless series of delegations. (CVE-2014-8602)
-
+
A source code patch exists which remedies this problem.
@@ -229,7 +229,7 @@
Missing memory barriers in virtio(4) can lead to hangs with virtio devices,
like vio(4) and vioblk(4).
-
+
A source code patch exists which remedies this problem.
@@ -242,7 +242,7 @@
X Advisory
-
+
A source code patch exists which remedies this problem.
@@ -255,7 +255,7 @@
Libevent Advisory
-
+
A source code patch exists which remedies this problem.
@@ -267,7 +267,7 @@
For more information, see the
X.org advisory.
-
+
A source code patch exists which remedies this problem.
@@ -276,7 +276,7 @@
All architectures
Don't permit TLS client connections to be downgraded to weak keys.
-
+
A source code patch exists which remedies this problem.
@@ -285,7 +285,7 @@
All architectures
Another fix for buffer overflows in malformed fonts.
-
+
A source code patch exists which remedies this problem.
@@ -297,7 +297,7 @@
For more information, see the
X.org advisory.
-
+
A source code patch exists which remedies this problem.
Note that the instructions should read cd /usr/xenocara/lib/libXfont
.
@@ -317,7 +317,7 @@
For more information, see the
OpenSSL advisory.
-
+
A source code patch exists which remedies this problem.
@@ -327,7 +327,7 @@
Fix a logic error in smtpd handling of SNI.
This could allow a remote user to crash the server or provoke a disconnect of other sessions.
-
+
A source code patch exists which remedies this problem.
@@ -337,7 +337,7 @@
A remote user can crash httpd by forcing the daemon to log to a file
before the logging system was initialized.
-
+
A source code patch exists which remedies this problem.
@@ -346,7 +346,7 @@
All architectures
Malformed binaries could trigger kernel panics or view kernel memory.
-
+
A source code patch exists which remedies this problem.
@@ -361,7 +361,7 @@
@@ -373,7 +373,7 @@
@@ -391,7 +391,7 @@
For more information, see the
OpenSSL advisory.
-
+
A source code patch exists which remedies this problem.
@@ -400,7 +400,7 @@
All architectures
A TCP socket can become confused and not properly cleanup resources.
-
+
A source code patch exists which remedies this problem.
@@ -410,7 +410,7 @@
A kernel memory leak could be triggered by an unprivileged user in
a failure case when using execve under systrace.
-
+
A source code patch exists which remedies this problem.
@@ -421,7 +421,7 @@
the obsolete SCCS and RCS support when processing a crafted input file.
This patch deletes the SCCS and RCS support.
-
+
A source code patch exists which remedies this problem.
@@ -430,7 +430,7 @@
All architectures
The patch utility could become desyncronized processing ed(1)-style diffs.
-
+
A source code patch exists which remedies this problem.
@@ -449,7 +449,7 @@
@@ -458,7 +458,7 @@
All architectures
A problem with timer kevents could result in a kernel hang (local denial
of service).
-
+
A source code patch exists which remedies this problem.
@@ -467,7 +467,7 @@
All architectures
The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun
and memory leak, as reported by Qualys Security.
-
+
A source code patch exists which remedies this problem.