===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata24.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -r1.60 -r1.61
--- www/errata24.html 2014/03/31 04:11:40 1.60
+++ www/errata24.html 2014/03/31 16:02:48 1.61
@@ -77,39 +77,45 @@
-
-RELIABILITY FIX All architectures
+RELIABILITY FIX
+ All architectures
A local user can crash the system by reading a file larger than 64meg
from an ext2fs partition.
A source code patch exists which remedies this problem.
-
-RELIABILITY FIX All architectures
+RELIABILITY FIX
+ All architectures
A local user can crash the system because of a bug in the vfs layer.
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A machine crash is possible when playing with poll(2).
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A machine crash is possible when playing with link(2) on FFS.
A source code patch exists which remedies this problem.
This is version four of the patch.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A buffer overflow existed in ping(8), which may have a security issue.
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A race condition in IP ipq handling could permit a remote crash.
A source code patch exists which remedies this problem.
@@ -117,40 +123,46 @@
and the tcp decoding patch.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A race condition existed between accept(2) and select(2) which could
permit an attacker to hang sockets from remote.
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
IP fragment assembly can bog the machine excessively and cause problems.
A source code patch exists which remedies this problem.
-
-FUNCTIONALITY FIX All architectures
+FUNCTIONALITY FIX
+ All architectures
The readv(2) and writev(2) system calls would not accept a struct iovec
with an iov_len of 0. This causes a db test in perl to fail.
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
TCP/IP RST handling was too sloppy.
A source code patch exists which remedies this problem.
-
-FUNCTIONALITY FIX All architectures
+FUNCTIONALITY FIX
+ All architectures
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
memory".
A source code patch exists which remedies this problem.
-
-FUNCTIONALITY FIX All architectures
+FUNCTIONALITY FIX
+ All architectures
A problem with writing to NFS version 3 mounted filesystems from Solaris 7
hosts exists. Attempts to create files will result in an error such as
"Inappropriate file type or format".
@@ -158,7 +170,8 @@
A source code patch exists which remedies this problem.
-
-FUNCTIONALITY FIX All architectures
+FUNCTIONALITY FIX
+ All architectures
A problem with NFS version 3 mounts on big endian machines (m68k, sparc
and powerpc) exists when mounting filesystems larger than 2gig. You
can see evidence of the bug by running df(1) and checking for negative
@@ -167,7 +180,8 @@
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A security problem exists in the curses and ocurses libraries that affect
setuid programs linked with -lcurses or -locurses.
@@ -178,7 +192,8 @@
platform. Unpack it in /usr/lib.
-
-FUNCTIONALITY FIX All architectures
+FUNCTIONALITY FIX
+ All architectures
A workaround for an xterm problem that causes vi to not
restore the correct cursor position on exit.
@@ -193,13 +208,15 @@
big endian version.
-
-FUNCTIONALITY FIX All architectures
+FUNCTIONALITY FIX
+ All architectures
userdir support was accidentally left out of httpd(8).
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A remotely exploitable problem exists in bootpd(8). bootpd is disabled
by default, but some people may actually be using it.
@@ -207,7 +224,8 @@
This is the second version of the patch.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A remote machine lockup problem exists in the TCP decoding code.
A source code patch exists which remedies this problem.