=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata28.html,v retrieving revision 1.69 retrieving revision 1.70 diff -c -r1.69 -r1.70 *** www/errata28.html 2014/10/02 14:34:45 1.69 --- www/errata28.html 2015/02/14 04:36:51 1.70 *************** *** 81,87 ****

!

  • 013: SECURITY FIX: Dec 18, 2000   All architectures
    Procfs contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD.
    A source code patch exists which remedies this problem.

    !

  • 012: INSTALL PROBLEM: Dec 14, 2000
    The IMac DV+ (and probably some other machines) incorrectly identify their video hardware, but it is possible to work around the problem.
    A source code patch exists which remedies this problem.

    !

  • 011: RELIABILITY FIX: Dec 13, 2000   All architectures
    The crypto subsystem could incorrectly fail to run certain software ciphers, *************** *** 291,311 **** A source code patch exists which remedies this problem.

    !

  • 010: RELIABILITY FIX: Dec 11, 2000   All architectures
    A crash could occur during fast routing, if IPSEC was enabled.
    A source code patch exists which remedies this problem.

    !

  • 009: SECURITY FIX: Dec 10, 2000   All architectures
    Another problem exists in the Kerberos libraries.
    A source code patch exists which remedies this problem.

    !

  • 008: SECURITY FIX: Dec 7, 2000   All architectures
    Two problems have recently been discovered in the KerberosIV code.

    --- 291,311 ---- A source code patch exists which remedies this problem.

    !

  • 010: RELIABILITY FIX: Dec 11, 2000   All architectures
    A crash could occur during fast routing, if IPSEC was enabled.
    A source code patch exists which remedies this problem.

    !

  • 009: SECURITY FIX: Dec 10, 2000   All architectures
    Another problem exists in the Kerberos libraries.
    A source code patch exists which remedies this problem.

    !

  • 008: SECURITY FIX: Dec 7, 2000   All architectures
    Two problems have recently been discovered in the KerberosIV code.

    *************** *** 321,327 **** A source code patch exists which remedies this problem.

    !

  • 007: INSTALL PROBLEM: Dec 4, 2000
    The X packages share28.tgz --- 321,327 ---- A source code patch exists which remedies this problem.

    !

  • 007: INSTALL PROBLEM: Dec 4, 2000
    The X packages share28.tgz *************** *** 334,340 **** # cd /; tar xvfpz xfont28.tgz

    !

  • 006: STABILITY FIX: Dec 4, 2000
    On some machines, a PCIBIOS device driver interrupt allocation bug can cause a kernel hang while probing PCI devices. If you have this symptom, you can disable --- 334,340 ---- # cd /; tar xvfpz xfont28.tgz

    !

  • 006: STABILITY FIX: Dec 4, 2000
    On some machines, a PCIBIOS device driver interrupt allocation bug can cause a kernel hang while probing PCI devices. If you have this symptom, you can disable *************** *** 351,357 **** permanently.

    !

  • 005: SECURITY FIX: Dec 4, 2000   All architectures
    OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.
    --- 351,357 ---- permanently.

    !

  • 005: SECURITY FIX: Dec 4, 2000   All architectures
    OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.
    *************** *** 359,365 **** A source code patch exists which remedies this problem. You can view the OpenBSD Advisory here.

    !

  • 004: RELIABILITY FIX: Nov 17, 2000   All architectures
    First off, AES (Rijndael) encryption and decryption were broken for IPsec --- 359,365 ---- A source code patch exists which remedies this problem. You can view the OpenBSD Advisory here.

    !

  • 004: RELIABILITY FIX: Nov 17, 2000   All architectures
    First off, AES (Rijndael) encryption and decryption were broken for IPsec *************** *** 369,381 **** A source code patch exists which remedies this problem. This is the second revision of the patch.

    !

  • 003: RELIABILITY FIX: Nov 17, 2000
    Configuring a qec+qe causes a NMI panic.
    A source code patch exists which remedies this problem.

    !

  • 002: IMPLEMENTATION FIX: Nov 10, 2000   All architectures
    In ssh(1), skey support for SSH1 protocol was broken. Some people might consider --- 369,381 ---- A source code patch exists which remedies this problem. This is the second revision of the patch.

    !

  • 003: RELIABILITY FIX: Nov 17, 2000
    Configuring a qec+qe causes a NMI panic.
    A source code patch exists which remedies this problem.

    !

  • 002: IMPLEMENTATION FIX: Nov 10, 2000   All architectures
    In ssh(1), skey support for SSH1 protocol was broken. Some people might consider *************** *** 383,389 **** A source code patch exists which remedies this problem.

    !

  • 001: RELIABILITY FIX: Nov 10, 2000
    When running a sparc with a serial console, certain types of interrupts would cause great grief.
    --- 383,389 ---- A source code patch exists which remedies this problem.

    !

  • 001: RELIABILITY FIX: Nov 10, 2000
    When running a sparc with a serial console, certain types of interrupts would cause great grief.