===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/plus.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -c -r1.183 -r1.184
*** www/plus.html 1998/02/14 11:58:06 1.183
--- www/plus.html 1998/02/14 12:00:14 1.184
***************
*** 1025,1036 ****
.rhosts file. This along with another issue is a security problem
in OpenBSD 2.2, and is
described and fixed with a patch.
-
In the 2.2 release, the SS4/SS5 kernel was not very reliable.
- A simple reliability patch is now
- available.
In compress(1), if the st_flags is 0, do not attempt a chflags(2) call.
Make stty(1) recognize STRIPDISC.
Fix a map corruption bug in ypxfr(8).
Place seperate so_ruid and so_euid fields in struct socket, so that
in_pcb.c can still do it's job, but also so that identd(8) can
be fast and return the proper uid.
--- 1025,1036 ----
.rhosts file. This along with another issue is a security problem
in OpenBSD 2.2, and is
described and fixed with a patch.
In compress(1), if the st_flags is 0, do not attempt a chflags(2) call.
Make stty(1) recognize STRIPDISC.
Fix a map corruption bug in ypxfr(8).
+ In the sparc 2.2 release, the SS4/SS5 kernel was not very
+ reliable. A simple reliability patch
+ is now available.
Place seperate so_ruid and so_euid fields in struct socket, so that
in_pcb.c can still do it's job, but also so that identd(8) can
be fast and return the proper uid.
***************
*** 1048,1054 ****
www@openbsd.org
!
$OpenBSD: plus.html,v 1.183 1998/02/14 11:58:06 deraadt Exp $