=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/plus33.html,v retrieving revision 1.5 retrieving revision 1.6 diff -c -r1.5 -r1.6 *** www/plus33.html 2003/04/13 16:19:11 1.5 --- www/plus33.html 2003/05/05 16:45:38 1.6 *************** *** 77,83 ****
  • Stop sendbug(1) reporting spurious errors.
  • Restore ac97(4) state after an apm(4) resume.
  • Make the syslogd(8) default facility LOG_USER instead of (due to a bug) LOG_UUCP. !
  • Make netstat(8) -m output of mbuf cluster stats much more useful.
  • Fix memory use percentage output of ps(1).
  • Some endianness fixes to ahc(4), making it works on macppc.
  • Fix some problems with pf(4) table statistics. --- 77,83 ----
  • Stop sendbug(1) reporting spurious errors.
  • Restore ac97(4) state after an apm(4) resume.
  • Make the syslogd(8) default facility LOG_USER instead of (due to a bug) LOG_UUCP. !
  • Make netstat(1) -m output of mbuf cluster stats much more useful.
  • Fix memory use percentage output of ps(1).
  • Some endianness fixes to ahc(4), making it works on macppc.
  • Fix some problems with pf(4) table statistics. *************** *** 87,93 ****
  • Enquote $lpd_flags in /etc/rc. !
  • Fix a logic error in sudo(1)'s SIGCHLD handler.
  • SECURITY FIX: OpenSSL is vulnerable to an extension of the `Bleichenbacher' attack designed by Czech researchers Klima, Pokorny and Rosa.
    A source code patch is available.
    [Applied to stable] --- 87,93 ----
  • Enquote $lpd_flags in /etc/rc. !
  • Fix a logic error in sudo(8)'s SIGCHLD handler.
  • SECURITY FIX: OpenSSL is vulnerable to an extension of the `Bleichenbacher' attack designed by Czech researchers Klima, Pokorny and Rosa.
    A source code patch is available.
    [Applied to stable] *************** *** 106,116 ****
  • Fix a bad string length when checking options to login_passwd(8).
  • Add a nicely free license to hack(6). !
  • Fix a bogus string initialisation when printing IPv6 addresses that was causing a segfault in netstat(8). !
  • More string function sanity in the 4.3BSD compat library, crypto(3) and sudo(1).
  • Fix a string under-allocation in mountd(8). !
  • Update to sudo(1) 1.6.7.
  • SECURITY FIX: Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
    An `RSA blinding' source code patch is available.
    [Applied to stable] --- 106,116 ----
  • Fix a bad string length when checking options to login_passwd(8).
  • Add a nicely free license to hack(6). !
  • Fix a bogus string initialisation when printing IPv6 addresses that was causing a segfault in netstat(1). !
  • More string function sanity in the 4.3BSD compat library, crypto(3) and sudo(8).
  • Fix a string under-allocation in mountd(8). !
  • Update to sudo(8) 1.6.7.
  • SECURITY FIX: Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
    An `RSA blinding' source code patch is available.
    [Applied to stable] *************** *** 129,137 **** [Applied to stable]
  • Require spamd(8) control connections to originate from a reserved port.
  • Plug a pf(4) tables memory leak. !
  • Scale the altq(4) RED thresholds to 10% (min) and 30% (max) of the queue limit.
  • Fix a one-byte underflow in raidctl(8). !
  • Switch RSA blinding on for isakmpd(8), ssh-agent(1) and ssk-keysign(8).
  • Still more sprintf -> snprintf and strcpy -> strlcpy in many, many places.
  • More strcpy -> strlcpy, this time in badsect(8), restore(8) and scsi(8). --- 129,137 ---- [Applied to stable]
  • Require spamd(8) control connections to originate from a reserved port.
  • Plug a pf(4) tables memory leak. !
  • Scale the altq(9) RED thresholds to 10% (min) and 30% (max) of the queue limit.
  • Fix a one-byte underflow in raidctl(8). !
  • Switch RSA blinding on for isakmpd(8), ssh-agent(1) and ssh-keysign(8).
  • Still more sprintf -> snprintf and strcpy -> strlcpy in many, many places.
  • More strcpy -> strlcpy, this time in badsect(8), restore(8) and scsi(8). *************** *** 1175,1181 ****
    OpenBSD www@openbsd.org !
    $OpenBSD: plus33.html,v 1.5 2003/04/13 16:19:11 deraadt Exp $ --- 1175,1181 ----
    OpenBSD www@openbsd.org !
    $OpenBSD: plus33.html,v 1.6 2003/05/05 16:45:38 deraadt Exp $