===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata46.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -c -r1.31 -r1.32
*** www/errata46.html 2014/10/02 14:34:45 1.31
--- www/errata46.html 2015/02/14 04:36:51 1.32
***************
*** 81,87 ****
! -
012: RELIABILITY FIX: May 14, 2010
All architectures
Insufficient protection of the trunk interface queues may cause
--- 81,87 ----
! -
012: RELIABILITY FIX: May 14, 2010
All architectures
Insufficient protection of the trunk interface queues may cause
***************
*** 91,97 ****
A source code patch exists which remedies this problem.
!
-
011: RELIABILITY FIX: May 14, 2010
All architectures
Incorrectly initialized state updates can cause pfsync update storms.
--- 91,97 ----
A source code patch exists which remedies this problem.
!
-
011: RELIABILITY FIX: May 14, 2010
All architectures
Incorrectly initialized state updates can cause pfsync update storms.
***************
*** 100,106 ****
A source code patch exists which remedies this problem.
!
-
010: SECURITY FIX: April 14, 2010
All architectures
In TLS connections, certain incorrectly formatted records can cause
--- 100,106 ----
A source code patch exists which remedies this problem.
!
-
010: SECURITY FIX: April 14, 2010
All architectures
In TLS connections, certain incorrectly formatted records can cause
***************
*** 110,116 ****
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: April 4, 2010
All architectures
When updating sensors showing the state of RAID volumes
--- 110,116 ----
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: April 4, 2010
All architectures
When updating sensors showing the state of RAID volumes
***************
*** 125,131 ****
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: March 31, 2010
All architectures
When decrypting packets, the internal decryption functions were not
--- 125,131 ----
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: March 31, 2010
All architectures
When decrypting packets, the internal decryption functions were not
***************
*** 136,142 ****
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: March 12, 2010
All architectures
Due to a null pointer dereference, it would be possible to crash ftpd when
--- 136,142 ----
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: March 12, 2010
All architectures
Due to a null pointer dereference, it would be possible to crash ftpd when
***************
*** 146,152 ****
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: March 12, 2010
All architectures
OpenSSL is susceptible to a buffer overflow due to a failure
--- 146,152 ----
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: March 12, 2010
All architectures
OpenSSL is susceptible to a buffer overflow due to a failure
***************
*** 156,162 ****
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: January 29, 2010
All architectures
By using ptrace(2) on an ancestor process, a loop in the process tree
--- 156,162 ----
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: January 29, 2010
All architectures
By using ptrace(2) on an ancestor process, a loop in the process tree
***************
*** 167,173 ****
A source code patch exists which remedies this problem.
!
-
004: SECURITY FIX: November 26, 2009
All architectures
The SSL/TLS protocol is subject to man-in-the-middle attacks related to
--- 167,173 ----
A source code patch exists which remedies this problem.
!
-
004: SECURITY FIX: November 26, 2009
All architectures
The SSL/TLS protocol is subject to man-in-the-middle attacks related to
***************
*** 179,185 ****
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
--- 179,185 ----
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
***************
*** 189,195 ****
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
--- 189,195 ----
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
***************
*** 198,204 ****
A source code patch exists which remedies this problem.
!
-
001: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
--- 198,204 ----
A source code patch exists which remedies this problem.
!
-
001: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server