mirror of https://github.com/openbsd/www.git
fix double words
This commit is contained in:
parent
cfd43fa06f
commit
b8a8621651
2
57.html
2
57.html
|
@ -278,7 +278,7 @@ to 5.7.
|
|||
<li><a href="https://man.openbsd.org/relayd.8">relayd(8)</a> now supports the random and source-hash modes with redirections.
|
||||
<li><a href="https://man.openbsd.org/relayd.8">relayd(8)</a> now supports the <a href="https://cvsweb.openbsd.org/src/share/snmp/OPENBSD-RELAYD-MIB.txt?rev=1.1">OPENBSD-RELAYD-MIB</a> via agentx with <a href="https://man.openbsd.org/snmpd.8">snmpd(8)</a>.
|
||||
<li>Added interfaces for setting the close-on-exec flag and/or non-blocking mode on new file descriptors: <a href="https://man.openbsd.org/pipe2.2">pipe2(2)</a>, <a href="https://man.openbsd.org/dup3.2">dup3(2)</a>, <a href="https://man.openbsd.org/accept4.2">accept4(2)</a>, <a href="https://man.openbsd.org/mkostemp.3">mkostemp(3)</a>, <a href="https://man.openbsd.org/mkostemps.3">mkostemps(3)</a>, the <code>SOCK_CLOEXEC</code> and <code>SOCK_NONBLOCK</code> flags for <a href="https://man.openbsd.org/socket.2">socket(2)</a> and <a href="https://man.openbsd.org/socketpair.2">socketpair(2)</a>, and the <code>MSG_CMSG_CLOEXEC</code> flag for <a href="https://man.openbsd.org/recvmsg.2">recvmsg(2)</a>. In addition, <a href="https://man.openbsd.org/posix_spawn_file_actions_adddup2.3">posix_spawn_file_actions_adddup2(3)</a> now always clears the close-on-exec flag.
|
||||
<li>Added interfaces for setting the close-on-exec flag on new FILE handles and for requesting exclusive creation via the the 'e' and 'x' mode letters for <a href="https://man.openbsd.org/fopen.3">fopen(3)</a>, <a href="https://man.openbsd.org/fdopen.3">fdopen(3)</a>, <a href="https://man.openbsd.org/freopen.3">freopen(3)</a>, and <a href="https://man.openbsd.org/popen.3">popen(3)</a>.
|
||||
<li>Added interfaces for setting the close-on-exec flag on new FILE handles and for requesting exclusive creation via the 'e' and 'x' mode letters for <a href="https://man.openbsd.org/fopen.3">fopen(3)</a>, <a href="https://man.openbsd.org/fdopen.3">fdopen(3)</a>, <a href="https://man.openbsd.org/freopen.3">freopen(3)</a>, and <a href="https://man.openbsd.org/popen.3">popen(3)</a>.
|
||||
<li>Many library functions and programs changed to use the above for safety or simplicity.
|
||||
<li>Added <a href="https://man.openbsd.org/chflagsat.2">chflagsat(2)</a>, <a href="https://man.openbsd.org/sockatmark.3">sockatmark(3)</a>, and <a href="https://man.openbsd.org/stravis.3">stravis(3)</a>.
|
||||
<li>Merged performance and safety fixes for <a href="https://man.openbsd.org/fts.3">fts(3)</a> from FreeBSD.
|
||||
|
|
2
68.html
2
68.html
|
@ -550,7 +550,7 @@ to 6.8.
|
|||
<li>Bug Fixes
|
||||
<ul>
|
||||
<li>Fix an off-by-one in the CBC padding removal.
|
||||
<li>Enforce in the TLSv1.3 server that that ClientHello messages after a HelloRetryRequest match the original ClientHello as per RFC 8446 section 4.1.2
|
||||
<li>Enforce in the TLSv1.3 server that ClientHello messages after a HelloRetryRequest match the original ClientHello as per RFC 8446 section 4.1.2
|
||||
<li>Avoid calling freezero with a negative size if a server sends a malformed plaintext of all zeroes.
|
||||
<li>Correct use of sockaddr_storage instead of sockaddr in openssl(1) s_client, which could lead to using 14 bytes of stack garbage instead of an IPv6 address in DTLS mode.
|
||||
<li>Fix a longstanding bug in <a href="https://man.openbsd.org/PEM_X509_INFO_read_bio">PEM_X509_INFO_read_bio(3)</a> that could cause use-after-free and double-free issues in calling programs.
|
||||
|
|
4
72.html
4
72.html
|
@ -169,7 +169,7 @@ to 7.2.
|
|||
improves how timers backing <a
|
||||
href="https://man.openbsd.org/delay.9">delay(9)</a> are managed.
|
||||
<li>Ensured <a href="https://man.openbsd.org/disklabel.5">disklabel(5)</a> is
|
||||
is read from/written to disk only from/to unused space or an OpenBSD partition.
|
||||
read from/written to disk only from/to unused space or an OpenBSD partition.
|
||||
<li>Ensured GPT header data is not used until all validity checks are passed.
|
||||
<li>Corrected handling of GPT usable LBA start/end values, preventing incorrect fallback to
|
||||
MBR partitioning.
|
||||
|
@ -1153,7 +1153,7 @@ to 7.2.
|
|||
kill(-1).
|
||||
<li>ssh_config(5): note that the ProxyJump directive also accepts the
|
||||
same tokens as ProxyCommand.
|
||||
<li>scp(1): do not not ftruncate(3) files early when in sftp mode. The
|
||||
<li>scp(1): do not ftruncate(3) files early when in sftp mode. The
|
||||
previous behaviour of unconditionally truncating the destination
|
||||
file would cause <code>scp ~/foo localhost:</code> and <code>scp
|
||||
localhost:foo ~/</code> to delete all the contents of their destination.
|
||||
|
|
|
@ -203,7 +203,7 @@ A source code patch exists which remedies this problem.</a>
|
|||
<strong>010: SECURITY FIX: July 25, 2021</strong>
|
||||
<i>All architectures</i>
|
||||
<br>
|
||||
relayd(8), when using the the http protocol strip filter directive or http
|
||||
relayd(8), when using the http protocol strip filter directive or http
|
||||
protocol macro expansion, processes format strings.
|
||||
<br>
|
||||
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.9/common/010_relayd.patch.sig">
|
||||
|
|
|
@ -255,7 +255,7 @@ A source code patch exists which remedies this problem.</a>
|
|||
<strong>015: SECURITY FIX: December 14, 2022</strong>
|
||||
<i>All architectures</i>
|
||||
<br>
|
||||
In X11 server fix local privileges elevation and and remote code
|
||||
In X11 server fix local privileges elevation and remote code
|
||||
execution for ssh X forwarding sessions. This addresses CVE-2022-46340
|
||||
CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344.
|
||||
<br>
|
||||
|
|
|
@ -189,7 +189,7 @@ A source code patch exists which remedies this problem.</a>
|
|||
<strong>009: SECURITY FIX: December 14, 2022</strong>
|
||||
<i>All architectures</i>
|
||||
<br>
|
||||
In X11 server fix local privileges elevation and and remote code
|
||||
In X11 server fix local privileges elevation and remote code
|
||||
execution for ssh X forwarding sessions. This addresses CVE-2022-46340
|
||||
CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344.
|
||||
<br>
|
||||
|
|
|
@ -2057,7 +2057,7 @@ December 27 - 30, 2006, Berlin, Germany.<br>
|
|||
Who can you trust? Well, us. OpenBSD was there, of course, for our annual
|
||||
closing event. fkr, grunk, jsg, mbalmer, mickey, sturm, uwe, martin,
|
||||
henning, moritz, bernd and wvdputte were there
|
||||
there to chat with attendees and discuss OpenBSD stuff. It was - as usual -
|
||||
to chat with attendees and discuss OpenBSD stuff. It was - as usual -
|
||||
a great end-of-the-year event. See you in Berlin again end of 2007.
|
||||
<p>
|
||||
|
||||
|
|
|
@ -106,7 +106,7 @@ Or merge this section in their existing <code>/etc/X11/xorg.conf</code> file.
|
|||
|
||||
<p>
|
||||
The <b>radeonhd</b> driver is now deprecated.
|
||||
Users of this this driver should update their <code>/etc/X11/xorg.conf</code> file
|
||||
Users of this driver should update their <code>/etc/X11/xorg.conf</code> file
|
||||
by replacing
|
||||
<pre>
|
||||
Driver "radeonhd"
|
||||
|
@ -723,4 +723,4 @@ chapter of the FAQ for more information.
|
|||
<a href="upgrade53.html">[5.2 -> 5.3]</a>
|
||||
|
||||
<hr>
|
||||
<small>$OpenBSD: upgrade52.html,v 1.31 2019/05/28 01:53:11 bentley Exp $</small>
|
||||
<small>$OpenBSD: upgrade52.html,v 1.32 2023/04/09 07:14:45 jsg Exp $</small>
|
||||
|
|
|
@ -191,7 +191,7 @@ The Songs 5.2 - 6.0
|
|||
<td class=lyrics>
|
||||
<p>
|
||||
Once there was a Wizard so old and wise<br>
|
||||
that he asked asked Mother Night for a new enterprise<br>
|
||||
that he asked Mother Night for a new enterprise<br>
|
||||
falling asleep his wish was heard<br>
|
||||
and by Merlin's beard<br>
|
||||
what a strange world he entered<br>
|
||||
|
@ -990,7 +990,7 @@ long. I pondered our recent efforts to fix random functions via
|
|||
standards bodies, and considered the real possibility of my being
|
||||
<a href="https://web.archive.org/web/20160304081847/https://lwn.net/Articles/563285/">
|
||||
harmed by the failure of an embedded 32 bit linux device in 2038</a>,
|
||||
and then this this song just wrote itself in about 10 minutes.
|
||||
and then this song just wrote itself in about 10 minutes.
|
||||
<p>
|
||||
Enjoy
|
||||
<p>
|
||||
|
@ -4361,7 +4361,7 @@ I bleeding got one, look! What's that then?
|
|||
<dt>Licenser:
|
||||
<dd>
|
||||
This is a Cisco HSRP patent document with the word "Cisco" crossed
|
||||
out and the word "IETF" written in in crayon.
|
||||
out and the word "IETF" written in crayon.
|
||||
<dt>Customer:
|
||||
<dd>
|
||||
The man didn't have the right form.
|
||||
|
|
Loading…
Reference in New Issue