[BACK]Return to errata46.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata46.html between version 1.47 and 1.48

version 1.47, 2017/03/28 04:04:52 version 1.48, 2017/03/28 06:41:18
Line 82 
Line 82 
 <hr>  <hr>
   
 <ul>  <ul>
 <li id="012_trunklacp">  <li id="p012_trunklacp">
 <font color="#009000"><strong>012: RELIABILITY FIX: May 14, 2010</strong></font>  <font color="#009000"><strong>012: RELIABILITY FIX: May 14, 2010</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient protection of the trunk interface queues may cause  Insufficient protection of the trunk interface queues may cause
Line 92 
Line 92 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="011_pfsync">  <li id="p011_pfsync">
 <font color="#009000"><strong>011: RELIABILITY FIX: May 14, 2010</strong></font>  <font color="#009000"><strong>011: RELIABILITY FIX: May 14, 2010</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrectly initialized state updates can cause pfsync update storms.  Incorrectly initialized state updates can cause pfsync update storms.
Line 101 
Line 101 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="010_openssl">  <li id="p010_openssl">
 <font color="#009000"><strong>010: SECURITY FIX: April 14, 2010</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: April 14, 2010</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 In TLS connections, certain incorrectly formatted records can cause  In TLS connections, certain incorrectly formatted records can cause
Line 111 
Line 111 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="009_mpi">  <li id="p009_mpi">
 <font color="#009000"><strong>009: RELIABILITY FIX: April 4, 2010</strong></font>  <font color="#009000"><strong>009: RELIABILITY FIX: April 4, 2010</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 When updating sensors showing the state of RAID volumes  When updating sensors showing the state of RAID volumes
 <a href="http://man.openbsd.org/?query=mpi&sektion=4">mpi(4)</a>  <a href="http://man.openbsd.org/OpenBSD-4.6/mpi.4">mpi(4)</a>
 allocates temporary memory and then returns it to the kernel as  allocates temporary memory and then returns it to the kernel as
 device memory.  device memory.
 This causes kernel memory usage to be misrepresented, eventually  This causes kernel memory usage to be misrepresented, eventually
Line 126 
Line 126 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="008_kerberos">  <li id="p008_kerberos">
 <font color="#009000"><strong>008: RELIABILITY FIX: March 31, 2010</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: March 31, 2010</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 When decrypting packets, the internal decryption functions were not  When decrypting packets, the internal decryption functions were not
Line 137 
Line 137 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="007_ftpd">  <li id="p007_ftpd">
 <font color="#009000"><strong>007: RELIABILITY FIX: March 12, 2010</strong></font>  <font color="#009000"><strong>007: RELIABILITY FIX: March 12, 2010</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a null pointer dereference, it would be possible to crash ftpd when  Due to a null pointer dereference, it would be possible to crash ftpd when
Line 147 
Line 147 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="006_openssl">  <li id="p006_openssl">
 <font color="#009000"><strong>006: SECURITY FIX: March 12, 2010</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: March 12, 2010</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenSSL is susceptible to a buffer overflow due to a failure  OpenSSL is susceptible to a buffer overflow due to a failure
Line 157 
Line 157 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="005_ptrace">  <li id="p005_ptrace">
 <font color="#009000"><strong>005: RELIABILITY FIX: January 29, 2010</strong></font>  <font color="#009000"><strong>005: RELIABILITY FIX: January 29, 2010</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 By using ptrace(2) on an ancestor process, a loop in the process tree  By using ptrace(2) on an ancestor process, a loop in the process tree
Line 168 
Line 168 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="004_openssl">  <li id="p004_openssl">
 <font color="#009000"><strong>004: SECURITY FIX: November 26, 2009</strong></font>  <font color="#009000"><strong>004: SECURITY FIX: November 26, 2009</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL/TLS protocol is subject to man-in-the-middle attacks related to  The SSL/TLS protocol is subject to man-in-the-middle attacks related to
Line 180 
Line 180 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="003_getsockopt">  <li id="p003_getsockopt">
 <font color="#009000"><strong>003: RELIABILITY FIX: October 28, 2009</strong></font>  <font color="#009000"><strong>003: RELIABILITY FIX: October 28, 2009</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,  getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
Line 190 
Line 190 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="002_xmm">  <li id="p002_xmm">
 <font color="#009000"><strong>002: RELIABILITY FIX: October 05, 2009</strong></font>  <font color="#009000"><strong>002: RELIABILITY FIX: October 05, 2009</strong></font>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 XMM exceptions are not correctly handled resulting in a kernel panic.  XMM exceptions are not correctly handled resulting in a kernel panic.
Line 199 
Line 199 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="001_bind">  <li id="p001_bind">
 <font color="#009000"><strong>001: RELIABILITY FIX: July 29, 2009</strong></font>  <font color="#009000"><strong>001: RELIABILITY FIX: July 29, 2009</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A vulnerability has been found in BIND's named server  A vulnerability has been found in BIND's named server

Legend:
Removed from v.1.47  
changed lines
  Added in v.1.48