===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata56.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -c -r1.15 -r1.16
*** www/errata56.html 2015/01/13 19:47:25 1.15
--- www/errata56.html 2015/02/14 04:36:51 1.16
***************
*** 82,88 ****
! -
001: RELIABILITY FIX: September 5, 2014
All architectures
Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4).
--- 82,88 ----
! -
001: RELIABILITY FIX: September 5, 2014
All architectures
Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4).
***************
*** 91,97 ****
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: October 1, 2014
All architectures
If IPv6 autoconf is active on an interface and the autoconfprivacy extension is used,
--- 91,97 ----
A source code patch exists which remedies this problem.
!
-
002: RELIABILITY FIX: October 1, 2014
All architectures
If IPv6 autoconf is active on an interface and the autoconfprivacy extension is used,
***************
*** 105,111 ****
A source code patch exists which remedies this problem.
!
-
003: SECURITY FIX: October 1, 2014
All architectures
nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual
--- 105,111 ----
A source code patch exists which remedies this problem.
!
-
003: SECURITY FIX: October 1, 2014
All architectures
nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual
***************
*** 116,122 ****
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: October 20, 2014
All architectures
Executable headers with an unaligned address will trigger a kernel panic.
--- 116,122 ----
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: October 20, 2014
All architectures
Executable headers with an unaligned address will trigger a kernel panic.
***************
*** 125,131 ****
A source code patch exists which remedies this problem.
!
-
005: SECURITY FIX: October 20, 2014
All architectures
This patch disables the SSLv3 protocol by default.
--- 125,131 ----
A source code patch exists which remedies this problem.
!
-
005: SECURITY FIX: October 20, 2014
All architectures
This patch disables the SSLv3 protocol by default.
***************
*** 140,146 ****
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: November 17, 2014
All architectures
Certain http requests can crash relayd.
--- 140,146 ----
A source code patch exists which remedies this problem.
!
-
006: RELIABILITY FIX: November 17, 2014
All architectures
Certain http requests can crash relayd.
***************
*** 149,155 ****
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: November 17, 2014
All architectures
A PF rule using an IPv4 address
--- 149,155 ----
A source code patch exists which remedies this problem.
!
-
007: RELIABILITY FIX: November 17, 2014
All architectures
A PF rule using an IPv4 address
***************
*** 161,167 ****
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: November 17, 2014
All architectures
Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.
--- 161,167 ----
A source code patch exists which remedies this problem.
!
-
008: RELIABILITY FIX: November 17, 2014
All architectures
Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.
***************
*** 170,176 ****
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: November 18, 2014
All architectures
httpd was developed very rapidly in the weeks before 5.6 release, and
--- 170,176 ----
A source code patch exists which remedies this problem.
!
-
009: RELIABILITY FIX: November 18, 2014
All architectures
httpd was developed very rapidly in the weeks before 5.6 release, and
***************
*** 183,189 ****
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: December 5, 2014
All architectures
Several bugs were fixed that allowed a crash from remote when an active pipex
--- 183,189 ----
A source code patch exists which remedies this problem.
!
-
010: RELIABILITY FIX: December 5, 2014
All architectures
Several bugs were fixed that allowed a crash from remote when an active pipex
***************
*** 193,199 ****
A source code patch exists which remedies this problem.
!
-
011: RELIABILITY FIX: December 5, 2014
All architectures
An incorrect memcpy call would result in corrupted MAC addresses when
--- 193,199 ----
A source code patch exists which remedies this problem.
!
-
011: RELIABILITY FIX: December 5, 2014
All architectures
An incorrect memcpy call would result in corrupted MAC addresses when
***************
*** 203,209 ****
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: December 9, 2014
All architectures
Fix a denial of service where a malicious authority could make the resolver chase an
--- 203,209 ----
A source code patch exists which remedies this problem.
!
-
012: RELIABILITY FIX: December 9, 2014
All architectures
Fix a denial of service where a malicious authority could make the resolver chase an
***************
*** 213,219 ****
A source code patch exists which remedies this problem.
!
-
013: RELIABILITY FIX: December 9, 2014
All architectures
Missing memory barriers in virtio(4) can lead to hangs with virtio devices,
--- 213,219 ----
A source code patch exists which remedies this problem.
!
-
013: RELIABILITY FIX: December 9, 2014
All architectures
Missing memory barriers in virtio(4) can lead to hangs with virtio devices,
***************
*** 223,229 ****
A source code patch exists which remedies this problem.
!
-
014: SECURITY FIX: December 9, 2014
All architectures
One year after Ilja van Sprundel discovered and reported a large number
--- 223,229 ----
A source code patch exists which remedies this problem.
!
-
014: SECURITY FIX: December 9, 2014
All architectures
One year after Ilja van Sprundel discovered and reported a large number
***************
*** 236,242 ****
A source code patch exists which remedies this problem.
!
-
015: SECURITY FIX: January 13, 2015
All architectures
Fix CVE-2014-6272 in libevent 1.4 event buffer handling. OpenBSD
--- 236,242 ----
A source code patch exists which remedies this problem.
!
-
015: SECURITY FIX: January 13, 2015
All architectures
Fix CVE-2014-6272 in libevent 1.4 event buffer handling. OpenBSD