=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata28.html,v retrieving revision 1.65 retrieving revision 1.66 diff -u -r1.65 -r1.66 --- www/errata28.html 2014/03/31 04:11:40 1.65 +++ www/errata28.html 2014/03/31 16:02:48 1.66 @@ -77,7 +77,8 @@

  • -013: SECURITY FIX: Dec 18, 2000   All architectures
    +013: SECURITY FIX: Dec 18, 2000All architectures
    Procfs contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD.
    A source code patch exists which remedies this problem. @@ -260,26 +279,30 @@ A source code patch exists which remedies this problem.

  • -011: RELIABILITY FIX: Dec 13, 2000   All architectures
    +011: RELIABILITY FIX: Dec 13, 2000All architectures
    The crypto subsystem could incorrectly fail to run certain software ciphers, if a hardware card existed in the machine.
    A source code patch exists which remedies this problem.

  • -010: RELIABILITY FIX: Dec 11, 2000   All architectures
    +010: RELIABILITY FIX: Dec 11, 2000All architectures
    A crash could occur during fast routing, if IPSEC was enabled.
    A source code patch exists which remedies this problem.

  • -009: SECURITY FIX: Dec 10, 2000   All architectures
    +009: SECURITY FIX: Dec 10, 2000All architectures
    Another problem exists in the Kerberos libraries.
    A source code patch exists which remedies this problem.

  • -008: SECURITY FIX: Dec 7, 2000   All architectures
    +008: SECURITY FIX: Dec 7, 2000All architectures
    Two problems have recently been discovered in the KerberosIV code.

    1. A symlink problem was discovered in the KerberosIV password checking routines /usr/bin/su and /usr/bin/login, which makes it possible for a @@ -324,14 +347,16 @@

  • -005: SECURITY FIX: Dec 4, 2000   All architectures
    +005: SECURITY FIX: Dec 4, 2000All architectures
    OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.
    A source code patch exists which remedies this problem. You can view the OpenBSD Advisory here.

  • -004: RELIABILITY FIX: Nov 17, 2000   All architectures
    +004: RELIABILITY FIX: Nov 17, 2000All architectures
    First off, AES (Rijndael) encryption and decryption were broken for IPsec and swap encryption.
    Secondly, the AES code did not work properly on big endian machines.
    @@ -346,7 +371,8 @@ A source code patch exists which remedies this problem.

  • -002: IMPLEMENTATION FIX: Nov 10, 2000   All architectures
    +002: IMPLEMENTATION FIX: Nov 10, 2000All architectures
    In ssh(1), skey support for SSH1 protocol was broken. Some people might consider that kind of important.