===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata53.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -c -r1.31 -r1.32
*** www/errata53.html 2014/10/02 14:34:45 1.31
--- www/errata53.html 2015/02/14 04:36:51 1.32
***************
*** 81,87 ****
! -
001: RELIABILITY FIX: March 15, 2013
All architectures
A rare condition during session startup may cause bgpd to replace
--- 81,87 ----
! -
001: RELIABILITY FIX: March 15, 2013
All architectures
A rare condition during session startup may cause bgpd to replace
***************
*** 93,99 ****
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: May 5, 2013
All architectures
A flaw exists in the
!
-
002: RELIABILITY FIX: May 5, 2013
All architectures
A flaw exists in the
!
-
003: RELIABILITY FIX: May 17, 2013
All architectures
A problem exists in
--- 104,110 ----
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: May 17, 2013
All architectures
A problem exists in
***************
*** 119,125 ****
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: May 17, 2013
All architectures
As discovered by Peter Philipp, it is possible for an unprivileged user
--- 119,125 ----
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: May 17, 2013
All architectures
As discovered by Peter Philipp, it is possible for an unprivileged user
***************
*** 131,137 ****
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: May 31, 2013
All architectures
A local denial of service is possible by an unprivileged user if the
--- 131,137 ----
A source code patch exists which remedies this problem.
!
-
005: RELIABILITY FIX: May 31, 2013
All architectures
A local denial of service is possible by an unprivileged user if the
***************
*** 142,148 ****
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: June 12, 2013
All architectures
A denial of services was discovered where certain combinations of
--- 142,148 ----
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: June 12, 2013
All architectures
A denial of services was discovered where certain combinations of
***************
*** 153,159 ****
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: June 12, 2013
All architectures
Two flaws in the vio(4)
--- 153,159 ----
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: June 12, 2013
All architectures
Two flaws in the vio(4)
***************
*** 163,169 ****
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: Nov 7, 2013
All architectures
A crash can happen on
--- 163,169 ----
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: Nov 7, 2013
All architectures
A crash can happen on
***************
*** 175,181 ****
A source code patch exists which remedies this problem.
!
-
009: SECURITY FIX: Nov 7, 2013
All architectures
A memory corruption vulnerability exists in the post-authentication sshd process
--- 175,181 ----
A source code patch exists which remedies this problem.
!
-
009: SECURITY FIX: Nov 7, 2013
All architectures
A memory corruption vulnerability exists in the post-authentication sshd process
***************
*** 190,196 ****
!
-
010: RELIABILITY FIX: Nov 11, 2013
All architectures
An unprivileged user may hang the system.
--- 190,196 ----
!
-
010: RELIABILITY FIX: Nov 11, 2013
All architectures
An unprivileged user may hang the system.
***************
*** 200,206 ****
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: Nov 21, 2013
All architectures
A problem exists in
--- 200,206 ----
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: Nov 21, 2013
All architectures
A problem exists in
***************
*** 213,219 ****
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: Dec 19, 2013
Strict alignment architectures
In OpenSSL, use of the SHA384 SSL/TLS ciphers may result in a crash of
--- 213,219 ----
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: Dec 19, 2013
Strict alignment architectures
In OpenSSL, use of the SHA384 SSL/TLS ciphers may result in a crash of
***************
*** 224,230 ****
A source code patch exists which remedies this problem.
!
-
013: SECURITY FIX: Jan 10, 2014
All architectures
A BDF font file containing a longer than expected string could overflow
--- 224,230 ----
A source code patch exists which remedies this problem.
!
-
013: SECURITY FIX: Jan 10, 2014
All architectures
A BDF font file containing a longer than expected string could overflow
***************
*** 235,241 ****
A source code patch exists which remedies this problem.
!
-
014: SECURITY FIX: April 8, 2014
All architectures
Missing bounds checking in OpenSSL's implementation of the TLS/DTLS
--- 235,241 ----
A source code patch exists which remedies this problem.
!
-
014: SECURITY FIX: April 8, 2014
All architectures
Missing bounds checking in OpenSSL's implementation of the TLS/DTLS
***************
*** 245,251 ****
A source code patch exists which remedies this problem.
!
-
015: SECURITY FIX: April 12, 2014
All architectures
A use-after-free race condition in OpenSSL's read buffer may permit an attacker
--- 245,251 ----
A source code patch exists which remedies this problem.
!
-
015: SECURITY FIX: April 12, 2014
All architectures
A use-after-free race condition in OpenSSL's read buffer may permit an attacker