===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata45.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -r1.55 -r1.56
--- www/errata45.html 2017/03/28 04:04:52 1.55
+++ www/errata45.html 2017/03/28 06:41:18 1.56
@@ -84,7 +84,7 @@
--
+
-
016: SECURITY FIX: April 14, 2010
All architectures
In TLS connections, certain incorrectly formatted records can cause
@@ -94,11 +94,11 @@
A source code patch exists which remedies this problem.
-
-
+
-
015: RELIABILITY FIX: April 4, 2010
All architectures
When updating sensors showing the state of RAID volumes
-mpi(4)
+mpi(4)
allocates temporary memory and then returns it to the kernel as
device memory.
This causes kernel memory usage to be misrepresented, eventually
@@ -109,7 +109,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
014: RELIABILITY FIX: March 31, 2010
All architectures
When decrypting packets, the internal decryption functions were not
@@ -120,7 +120,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
013: RELIABILITY FIX: March 12, 2010
All architectures
Due to a null pointer dereference, it would be possible to crash ftpd when
@@ -130,7 +130,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
012: SECURITY FIX: March 12, 2010
All architectures
OpenSSL is susceptible to a buffer overflow due to a failure
@@ -140,7 +140,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
011: RELIABILITY FIX: January 29, 2010
All architectures
By using ptrace(2) on an ancestor process, a loop in the process tree
@@ -151,7 +151,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
010: SECURITY FIX: November 26, 2009
All architectures
The SSL/TLS protocol is subject to man-in-the-middle attacks related to
@@ -163,7 +163,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
009: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
@@ -173,7 +173,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
008: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
@@ -182,7 +182,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
007: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
@@ -194,7 +194,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
006: RELIABILITY FIX: June 24, 2009
All architectures
An off-by-one error in the inflate function in Zlib.xs in the
@@ -209,13 +209,13 @@
-
-
+
-
005: RELIABILITY FIX: April 24, 2009
All architectures
On very high system load, an audio interrupt may occur while the
audio process is filling audio ring buffers. This triggers bogus
(and useless) correction code in the
-audio(4)
+audio(4)
driver causing the audio application to go out of sync, and in turn causing
continuous stuttering until the application is restarted.
@@ -223,11 +223,11 @@
A source code patch exists which remedies this problem.
-
-
+
-
004: RELIABILITY FIX: April 24, 2009
All architectures
In server mode when in full-duplex mode (the default)
-aucat(1)
+aucat(1)
will send each synchronization message twice, causing client applications
to think that buffer underruns are occuring. Depending on the
application, this may cause the sound to stutter.
@@ -236,13 +236,13 @@
A source code patch exists which remedies this problem.
-
-
+
-
003: RELIABILITY FIX: April 24, 2009
i386 only
When DMA'able memory is mapped by device drivers, the
mapping flags and protection are partially uninitialized.
Depending on the calling context, this may cause devices to misbehave, like
-audio(4)
+audio(4)
to stutter, but other anomalies might be observed for other
device types.
@@ -250,7 +250,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
002: RELIABILITY FIX: April 11, 2009
All architectures
When pf attempts to perform translation on a specially crafted IP datagram,
@@ -271,7 +271,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
001: RELIABILITY FIX: April 8, 2009
All architectures
The OpenSSL ASN.1 handling code could be forced to perform invalid memory