===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata.html,v
retrieving revision 1.291
retrieving revision 1.292
diff -c -r1.291 -r1.292
*** www/errata.html 2000/12/10 22:07:31 1.291
--- www/errata.html 2000/12/15 01:08:13 1.292
***************
*** 45,50 ****
--- 45,61 ----
All architectures
+
+ - 011: RELIABILITY FIX: Dec 13, 2000
+ The crypto sybsystem could incorrectly fail to run certain software ciphers,
+ if a hardware card existed in the machine.
+
+ A source code patch exists which remedies the problem.
+
+ - 010: RELIABILITY FIX: Dec 11, 2000
+ A crash could occur during fast routing, if IPSEC was enabled.
+
+ A source code patch exists which remedies the problem.
- 009: SECURITY FIX: Dec 10, 2000
Another problem exists in the kerberos libraries.
***************
*** 74,83 ****
- 004: RELIABILITY FIX: Nov 17, 2000
! AES (rijndael) encryption and decryption were broken for IPSec and swap
! encryption.
! A source code patch exists which remedies the problem.
- 002: IMPLEMENTATION FIX: Nov 10, 2000
In ssh(1), skey support for SSH1 protocol was broken. Some people might consider
--- 85,95 ----
- 004: RELIABILITY FIX: Nov 17, 2000
! First off, AES (rijndael) encryption and decryption were broken for IPSec
! and swap encryption.
! Secondly, the AES code did not work properly on big endian machines.
! A second revision source code patch exists which remedies the problem.
- 002: IMPLEMENTATION FIX: Nov 10, 2000
In ssh(1), skey support for SSH1 protocol was broken. Some people might consider
***************
*** 257,263 ****
www@openbsd.org
!
$OpenBSD: errata.html,v 1.291 2000/12/10 22:07:31 deraadt Exp $