=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata28.html,v retrieving revision 1.29 retrieving revision 1.30 diff -c -r1.29 -r1.30 *** www/errata28.html 2002/10/17 21:38:38 1.29 --- www/errata28.html 2003/03/06 21:44:07 1.30 *************** *** 1,8 **** ! OpenBSD 2.8 errata ! --- 1,8 ---- ! OpenBSD 2.8 errata ! *************** *** 13,19 **** [OpenBSD] !

This is the OpenBSD 2.8 release errata & patch list:

--- 13,19 ---- [OpenBSD] !

This is the OpenBSD 2.8 release errata & patch list:

*************** *** 36,42 ****

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. --- 36,42 ----

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. *************** *** 50,60 ****
!
  • All architectures

    !

  • 013: SECURITY FIX: Dec 18, 2000
    ! Procfs contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD.
    A source code patch exists which remedies the problem.

    !

  • 011: RELIABILITY FIX: Dec 13, 2000
    The crypto subsystem could incorrectly fail to run certain software ciphers, if a hardware card existed in the machine.
    A source code patch exists which remedies the problem.

    !

  • 010: RELIABILITY FIX: Dec 11, 2000
    A crash could occur during fast routing, if IPSEC was enabled.
    A source code patch exists which remedies the problem.

    !

  • 009: SECURITY FIX: Dec 10, 2000
    Another problem exists in the Kerberos libraries.
    A source code patch exists which remedies the problem.

    !

  • 008: SECURITY FIX: Dec 7, 2000
    Two problems have recently been discovered in the KerberosIV code.

    1. A symlink problem was discovered in the KerberosIV password checking routines /usr/bin/su and /usr/bin/login, which makes it possible for a *************** *** 232,273 **** A source code patch exists which remedies the problem.

    !

  • 005: SECURITY FIX: Dec 4, 2000
    OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.
    A source code patch exists which remedies the problem.
    You can view the OpenBSD Advisory here.

    !

  • 004: RELIABILITY FIX: Nov 17, 2000
    First off, AES (Rijndael) encryption and decryption were broken for IPsec and swap encryption.
    Secondly, the AES code did not work properly on big endian machines.
    A second revision source code patch exists which remedies the problem.

    !

  • 002: IMPLEMENTATION FIX: Nov 10, 2000
    In ssh(1), skey support for SSH1 protocol was broken. Some people might consider that kind of important.
    ! A source code patch exists which remedies this problem.

    !

  • i386

    !

  • i386

    !

  • mac68k

    !

  • mac68k

    !

  • sparc

    !

  • sparc

    !

  • amiga

    !

  • amiga

    !

  • pmax

    !

  • hp300

    !

  • pmax

    !

  • hp300

    !

  • mvme68k

    !

  • mvme68k

    !

  • powerpc

    !

  • powerpc

    !

  • vax

    !

  • sun3

    !

  • vax

    !

  • sun3