fix double words

This commit is contained in:
jsg 2023-04-09 07:14:45 +00:00
parent cfd43fa06f
commit b8a8621651
9 changed files with 13 additions and 13 deletions

View File

@ -278,7 +278,7 @@ to 5.7.
<li><a href="https://man.openbsd.org/relayd.8">relayd(8)</a> now supports the random and source-hash modes with redirections.
<li><a href="https://man.openbsd.org/relayd.8">relayd(8)</a> now supports the <a href="https://cvsweb.openbsd.org/src/share/snmp/OPENBSD-RELAYD-MIB.txt?rev=1.1">OPENBSD-RELAYD-MIB</a> via agentx with <a href="https://man.openbsd.org/snmpd.8">snmpd(8)</a>.
<li>Added interfaces for setting the close-on-exec flag and/or non-blocking mode on new file descriptors: <a href="https://man.openbsd.org/pipe2.2">pipe2(2)</a>, <a href="https://man.openbsd.org/dup3.2">dup3(2)</a>, <a href="https://man.openbsd.org/accept4.2">accept4(2)</a>, <a href="https://man.openbsd.org/mkostemp.3">mkostemp(3)</a>, <a href="https://man.openbsd.org/mkostemps.3">mkostemps(3)</a>, the <code>SOCK_CLOEXEC</code> and <code>SOCK_NONBLOCK</code> flags for <a href="https://man.openbsd.org/socket.2">socket(2)</a> and <a href="https://man.openbsd.org/socketpair.2">socketpair(2)</a>, and the <code>MSG_CMSG_CLOEXEC</code> flag for <a href="https://man.openbsd.org/recvmsg.2">recvmsg(2)</a>. In addition, <a href="https://man.openbsd.org/posix_spawn_file_actions_adddup2.3">posix_spawn_file_actions_adddup2(3)</a> now always clears the close-on-exec flag.
<li>Added interfaces for setting the close-on-exec flag on new FILE handles and for requesting exclusive creation via the the 'e' and 'x' mode letters for <a href="https://man.openbsd.org/fopen.3">fopen(3)</a>, <a href="https://man.openbsd.org/fdopen.3">fdopen(3)</a>, <a href="https://man.openbsd.org/freopen.3">freopen(3)</a>, and <a href="https://man.openbsd.org/popen.3">popen(3)</a>.
<li>Added interfaces for setting the close-on-exec flag on new FILE handles and for requesting exclusive creation via the 'e' and 'x' mode letters for <a href="https://man.openbsd.org/fopen.3">fopen(3)</a>, <a href="https://man.openbsd.org/fdopen.3">fdopen(3)</a>, <a href="https://man.openbsd.org/freopen.3">freopen(3)</a>, and <a href="https://man.openbsd.org/popen.3">popen(3)</a>.
<li>Many library functions and programs changed to use the above for safety or simplicity.
<li>Added <a href="https://man.openbsd.org/chflagsat.2">chflagsat(2)</a>, <a href="https://man.openbsd.org/sockatmark.3">sockatmark(3)</a>, and <a href="https://man.openbsd.org/stravis.3">stravis(3)</a>.
<li>Merged performance and safety fixes for <a href="https://man.openbsd.org/fts.3">fts(3)</a> from FreeBSD.

View File

@ -550,7 +550,7 @@ to 6.8.
<li>Bug Fixes
<ul>
<li>Fix an off-by-one in the CBC padding removal.
<li>Enforce in the TLSv1.3 server that that ClientHello messages after a HelloRetryRequest match the original ClientHello as per RFC 8446 section 4.1.2
<li>Enforce in the TLSv1.3 server that ClientHello messages after a HelloRetryRequest match the original ClientHello as per RFC 8446 section 4.1.2
<li>Avoid calling freezero with a negative size if a server sends a malformed plaintext of all zeroes.
<li>Correct use of sockaddr_storage instead of sockaddr in openssl(1) s_client, which could lead to using 14 bytes of stack garbage instead of an IPv6 address in DTLS mode.
<li>Fix a longstanding bug in <a href="https://man.openbsd.org/PEM_X509_INFO_read_bio">PEM_X509_INFO_read_bio(3)</a> that could cause use-after-free and double-free issues in calling programs.

View File

@ -169,7 +169,7 @@ to 7.2.
improves how timers backing <a
href="https://man.openbsd.org/delay.9">delay(9)</a> are managed.
<li>Ensured <a href="https://man.openbsd.org/disklabel.5">disklabel(5)</a> is
is read from/written to disk only from/to unused space or an OpenBSD partition.
read from/written to disk only from/to unused space or an OpenBSD partition.
<li>Ensured GPT header data is not used until all validity checks are passed.
<li>Corrected handling of GPT usable LBA start/end values, preventing incorrect fallback to
MBR partitioning.
@ -1153,7 +1153,7 @@ to 7.2.
kill(-1).
<li>ssh_config(5): note that the ProxyJump directive also accepts the
same tokens as ProxyCommand.
<li>scp(1): do not not ftruncate(3) files early when in sftp mode. The
<li>scp(1): do not ftruncate(3) files early when in sftp mode. The
previous behaviour of unconditionally truncating the destination
file would cause <code>scp ~/foo localhost:</code> and <code>scp
localhost:foo ~/</code> to delete all the contents of their destination.

View File

@ -203,7 +203,7 @@ A source code patch exists which remedies this problem.</a>
<strong>010: SECURITY FIX: July 25, 2021</strong>
&nbsp; <i>All architectures</i>
<br>
relayd(8), when using the the http protocol strip filter directive or http
relayd(8), when using the http protocol strip filter directive or http
protocol macro expansion, processes format strings.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.9/common/010_relayd.patch.sig">

View File

@ -255,7 +255,7 @@ A source code patch exists which remedies this problem.</a>
<strong>015: SECURITY FIX: December 14, 2022</strong>
&nbsp; <i>All architectures</i>
<br>
In X11 server fix local privileges elevation and and remote code
In X11 server fix local privileges elevation and remote code
execution for ssh X forwarding sessions. This addresses CVE-2022-46340
CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344.
<br>

View File

@ -189,7 +189,7 @@ A source code patch exists which remedies this problem.</a>
<strong>009: SECURITY FIX: December 14, 2022</strong>
&nbsp; <i>All architectures</i>
<br>
In X11 server fix local privileges elevation and and remote code
In X11 server fix local privileges elevation and remote code
execution for ssh X forwarding sessions. This addresses CVE-2022-46340
CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344.
<br>

View File

@ -2057,7 +2057,7 @@ December 27 - 30, 2006, Berlin, Germany.<br>
Who can you trust? Well, us. OpenBSD was there, of course, for our annual
closing event. fkr, grunk, jsg, mbalmer, mickey, sturm, uwe, martin,
henning, moritz, bernd and wvdputte were there
there to chat with attendees and discuss OpenBSD stuff. It was - as usual -
to chat with attendees and discuss OpenBSD stuff. It was - as usual -
a great end-of-the-year event. See you in Berlin again end of 2007.
<p>

View File

@ -106,7 +106,7 @@ Or merge this section in their existing <code>/etc/X11/xorg.conf</code> file.
<p>
The <b>radeonhd</b> driver is now deprecated.
Users of this this driver should update their <code>/etc/X11/xorg.conf</code> file
Users of this driver should update their <code>/etc/X11/xorg.conf</code> file
by replacing
<pre>
Driver "radeonhd"
@ -723,4 +723,4 @@ chapter of the FAQ for more information.
<a href="upgrade53.html">[5.2 -> 5.3]</a>
<hr>
<small>$OpenBSD: upgrade52.html,v 1.31 2019/05/28 01:53:11 bentley Exp $</small>
<small>$OpenBSD: upgrade52.html,v 1.32 2023/04/09 07:14:45 jsg Exp $</small>

View File

@ -191,7 +191,7 @@ The Songs 5.2 - 6.0
<td class=lyrics>
<p>
Once there was a Wizard so old and wise<br>
that he asked asked Mother Night for a new enterprise<br>
that he asked Mother Night for a new enterprise<br>
falling asleep his wish was heard<br>
and by Merlin's beard<br>
what a strange world he entered<br>
@ -990,7 +990,7 @@ long. I pondered our recent efforts to fix random functions via
standards bodies, and considered the real possibility of my being
<a href="https://web.archive.org/web/20160304081847/https://lwn.net/Articles/563285/">
harmed by the failure of an embedded 32 bit linux device in 2038</a>,
and then this this song just wrote itself in about 10 minutes.
and then this song just wrote itself in about 10 minutes.
<p>
Enjoy
<p>
@ -4361,7 +4361,7 @@ I bleeding got one, look! What's that then?
<dt>Licenser:
<dd>
This is a Cisco HSRP patent document with the word "Cisco" crossed
out and the word "IETF" written in in crayon.
out and the word "IETF" written in crayon.
<dt>Customer:
<dd>
The man didn't have the right form.