===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata45.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -c -r1.39 -r1.40
*** www/errata45.html 2014/10/02 14:34:45 1.39
--- www/errata45.html 2015/02/14 04:36:51 1.40
***************
*** 81,87 ****
! -
016: SECURITY FIX: April 14, 2010
All architectures
In TLS connections, certain incorrectly formatted records can cause
--- 81,87 ----
! -
016: SECURITY FIX: April 14, 2010
All architectures
In TLS connections, certain incorrectly formatted records can cause
***************
*** 91,97 ****
A source code patch exists which remedies this problem.
!
-
015: RELIABILITY FIX: April 4, 2010
All architectures
When updating sensors showing the state of RAID volumes
--- 91,97 ----
A source code patch exists which remedies this problem.
!
-
015: RELIABILITY FIX: April 4, 2010
All architectures
When updating sensors showing the state of RAID volumes
***************
*** 106,112 ****
A source code patch exists which remedies this problem.
!
-
014: RELIABILITY FIX: March 31, 2010
All architectures
When decrypting packets, the internal decryption functions were not
--- 106,112 ----
A source code patch exists which remedies this problem.
!
-
014: RELIABILITY FIX: March 31, 2010
All architectures
When decrypting packets, the internal decryption functions were not
***************
*** 117,123 ****
A source code patch exists which remedies this problem.
!
-
013: RELIABILITY FIX: March 12, 2010
All architectures
Due to a null pointer dereference, it would be possible to crash ftpd when
--- 117,123 ----
A source code patch exists which remedies this problem.
!
-
013: RELIABILITY FIX: March 12, 2010
All architectures
Due to a null pointer dereference, it would be possible to crash ftpd when
***************
*** 127,133 ****
A source code patch exists which remedies this problem.
!
-
012: SECURITY FIX: March 12, 2010
All architectures
OpenSSL is susceptible to a buffer overflow due to a failure
--- 127,133 ----
A source code patch exists which remedies this problem.
!
-
012: SECURITY FIX: March 12, 2010
All architectures
OpenSSL is susceptible to a buffer overflow due to a failure
***************
*** 137,143 ****
A source code patch exists which remedies this problem.
!
-
011: RELIABILITY FIX: January 29, 2010
All architectures
By using ptrace(2) on an ancestor process, a loop in the process tree
--- 137,143 ----
A source code patch exists which remedies this problem.
!
-
011: RELIABILITY FIX: January 29, 2010
All architectures
By using ptrace(2) on an ancestor process, a loop in the process tree
***************
*** 148,154 ****
A source code patch exists which remedies this problem.
!
-
010: SECURITY FIX: November 26, 2009
All architectures
The SSL/TLS protocol is subject to man-in-the-middle attacks related to
--- 148,154 ----
A source code patch exists which remedies this problem.
!
-
010: SECURITY FIX: November 26, 2009
All architectures
The SSL/TLS protocol is subject to man-in-the-middle attacks related to
***************
*** 160,166 ****
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
--- 160,166 ----
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
***************
*** 170,176 ****
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
--- 170,176 ----
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
***************
*** 179,185 ****
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
--- 179,185 ----
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
***************
*** 191,197 ****
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: June 24, 2009
All architectures
An off-by-one error in the inflate function in Zlib.xs in the
--- 191,197 ----
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: June 24, 2009
All architectures
An off-by-one error in the inflate function in Zlib.xs in the
***************
*** 206,212 ****
!
-
005: RELIABILITY FIX: April 24, 2009
All architectures
On very high system load, an audio interrupt may occur while the
--- 206,212 ----
!
-
005: RELIABILITY FIX: April 24, 2009
All architectures
On very high system load, an audio interrupt may occur while the
***************
*** 220,226 ****
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: April 24, 2009
All architectures
In server mode when in full-duplex mode (the default)
--- 220,226 ----
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: April 24, 2009
All architectures
In server mode when in full-duplex mode (the default)
***************
*** 233,239 ****
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: April 24, 2009
i386 only
When DMA'able memory is mapped by device drivers, the
--- 233,239 ----
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: April 24, 2009
i386 only
When DMA'able memory is mapped by device drivers, the
***************
*** 247,253 ****
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
--- 247,253 ----
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
***************
*** 268,274 ****
A source code patch exists which remedies this problem.
!
-
001: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory
--- 268,274 ----
A source code patch exists which remedies this problem.
!
-
001: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory