===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata46.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -c -r1.47 -r1.48
*** www/errata46.html 2017/03/28 04:04:52 1.47
--- www/errata46.html 2017/03/28 06:41:18 1.48
***************
*** 82,88 ****
! -
012: RELIABILITY FIX: May 14, 2010
All architectures
Insufficient protection of the trunk interface queues may cause
--- 82,88 ----
! -
012: RELIABILITY FIX: May 14, 2010
All architectures
Insufficient protection of the trunk interface queues may cause
***************
*** 92,98 ****
A source code patch exists which remedies this problem.
!
-
011: RELIABILITY FIX: May 14, 2010
All architectures
Incorrectly initialized state updates can cause pfsync update storms.
--- 92,98 ----
A source code patch exists which remedies this problem.
!
-
011: RELIABILITY FIX: May 14, 2010
All architectures
Incorrectly initialized state updates can cause pfsync update storms.
***************
*** 101,107 ****
A source code patch exists which remedies this problem.
!
-
010: SECURITY FIX: April 14, 2010
All architectures
In TLS connections, certain incorrectly formatted records can cause
--- 101,107 ----
A source code patch exists which remedies this problem.
!
-
010: SECURITY FIX: April 14, 2010
All architectures
In TLS connections, certain incorrectly formatted records can cause
***************
*** 111,121 ****
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: April 4, 2010
All architectures
When updating sensors showing the state of RAID volumes
! mpi(4)
allocates temporary memory and then returns it to the kernel as
device memory.
This causes kernel memory usage to be misrepresented, eventually
--- 111,121 ----
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: April 4, 2010
All architectures
When updating sensors showing the state of RAID volumes
! mpi(4)
allocates temporary memory and then returns it to the kernel as
device memory.
This causes kernel memory usage to be misrepresented, eventually
***************
*** 126,132 ****
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: March 31, 2010
All architectures
When decrypting packets, the internal decryption functions were not
--- 126,132 ----
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: March 31, 2010
All architectures
When decrypting packets, the internal decryption functions were not
***************
*** 137,143 ****
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: March 12, 2010
All architectures
Due to a null pointer dereference, it would be possible to crash ftpd when
--- 137,143 ----
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: March 12, 2010
All architectures
Due to a null pointer dereference, it would be possible to crash ftpd when
***************
*** 147,153 ****
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: March 12, 2010
All architectures
OpenSSL is susceptible to a buffer overflow due to a failure
--- 147,153 ----
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: March 12, 2010
All architectures
OpenSSL is susceptible to a buffer overflow due to a failure
***************
*** 157,163 ****
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: January 29, 2010
All architectures
By using ptrace(2) on an ancestor process, a loop in the process tree
--- 157,163 ----
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: January 29, 2010
All architectures
By using ptrace(2) on an ancestor process, a loop in the process tree
***************
*** 168,174 ****
A source code patch exists which remedies this problem.
!
-
004: SECURITY FIX: November 26, 2009
All architectures
The SSL/TLS protocol is subject to man-in-the-middle attacks related to
--- 168,174 ----
A source code patch exists which remedies this problem.
!
-
004: SECURITY FIX: November 26, 2009
All architectures
The SSL/TLS protocol is subject to man-in-the-middle attacks related to
***************
*** 180,186 ****
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
--- 180,186 ----
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: October 28, 2009
All architectures
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
***************
*** 190,196 ****
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
--- 190,196 ----
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: October 05, 2009
i386 only
XMM exceptions are not correctly handled resulting in a kernel panic.
***************
*** 199,205 ****
A source code patch exists which remedies this problem.
!
-
001: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server
--- 199,205 ----
A source code patch exists which remedies this problem.
!
-
001: RELIABILITY FIX: July 29, 2009
All architectures
A vulnerability has been found in BIND's named server