[BACK]Return to 62.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/62.html between version 1.92 and 1.93

version 1.92, 2019/05/27 22:55:18 version 1.93, 2019/06/01 22:54:16
Line 296 
Line 296 
         <a href="https://man.openbsd.org/freezero.3">freezero(3)</a>          <a href="https://man.openbsd.org/freezero.3">freezero(3)</a>
         to easily clear and free memory holding sensitive data has been added.          to easily clear and free memory holding sensitive data has been added.
     <li>Double free detection has been improved when the F      <li>Double free detection has been improved when the F
         <a href="https://man.openbsd.org/malloc.3">malloc(3)</a> option is used.          <a href="https://man.openbsd.org/malloc.3">malloc(3)</a> option is used.
         The existing S option now includes F.          The existing S option now includes F.
     <li>The <a href="https://man.openbsd.org/tty.4#TIOCSTI">TIOCSTI</a>      <li>The <a href="https://man.openbsd.org/tty.4#TIOCSTI">TIOCSTI</a>
         tty ioctl has been removed.  The I/O-loops in the last two consumers          tty ioctl has been removed.  The I/O-loops in the last two consumers
         <a href="https://man.openbsd.org/csh.1">csh(1)</a> and          <a href="https://man.openbsd.org/csh.1">csh(1)</a> and
Line 342 
Line 342 
     <li>Achieve higher levels of paranoia regarding structure packing, and      <li>Achieve higher levels of paranoia regarding structure packing, and
         clear many kernel objects before passing to userland.          clear many kernel objects before passing to userland.
     <li>Disable some optimizations in      <li>Disable some optimizations in
         <a href="https://man.openbsd.org/clang.1">clang(1)</a>          <a href="https://man.openbsd.org/clang.1">clang(1)</a>
         due to incompatibility with security.          due to incompatibility with security.
     <li>For instance, cope with      <li>For instance, cope with
         <a href="https://man.openbsd.org/clang.1">clang(1)</a>'s assumption          <a href="https://man.openbsd.org/clang.1">clang(1)</a>'s assumption
         that static or const          that static or const
         objects placed in unknown sections (such as .openbsd.randomdata)          objects placed in unknown sections (such as .openbsd.randomdata)
         are surely always 0, and therefore such memory accesses can be          are surely always 0, and therefore such memory accesses can be

Legend:
Removed from v.1.92  
changed lines
  Added in v.1.93