=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/plus33.html,v retrieving revision 1.5 retrieving revision 1.6 diff -u -r1.5 -r1.6 --- www/plus33.html 2003/04/13 16:19:11 1.5 +++ www/plus33.html 2003/05/05 16:45:38 1.6 @@ -77,7 +77,7 @@
  • Stop sendbug(1) reporting spurious errors.
  • Restore ac97(4) state after an apm(4) resume.
  • Make the syslogd(8) default facility LOG_USER instead of (due to a bug) LOG_UUCP. -
  • Make netstat(8) -m output of mbuf cluster stats much more useful. +
  • Make netstat(1) -m output of mbuf cluster stats much more useful.
  • Fix memory use percentage output of ps(1).
  • Some endianness fixes to ahc(4), making it works on macppc.
  • Fix some problems with pf(4) table statistics. @@ -87,7 +87,7 @@
  • Enquote $lpd_flags in /etc/rc. -
  • Fix a logic error in sudo(1)'s SIGCHLD handler. +
  • Fix a logic error in sudo(8)'s SIGCHLD handler.
  • SECURITY FIX: OpenSSL is vulnerable to an extension of the `Bleichenbacher' attack designed by Czech researchers Klima, Pokorny and Rosa.
    A source code patch is available.
    [Applied to stable] @@ -106,11 +106,11 @@
  • Fix a bad string length when checking options to login_passwd(8).
  • Add a nicely free license to hack(6). -
  • Fix a bogus string initialisation when printing IPv6 addresses that was causing a segfault in netstat(8). +
  • Fix a bogus string initialisation when printing IPv6 addresses that was causing a segfault in netstat(1). -
  • More string function sanity in the 4.3BSD compat library, crypto(3) and sudo(1). +
  • More string function sanity in the 4.3BSD compat library, crypto(3) and sudo(8).
  • Fix a string under-allocation in mountd(8). -
  • Update to sudo(1) 1.6.7. +
  • Update to sudo(8) 1.6.7.
  • SECURITY FIX: Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
    An `RSA blinding' source code patch is available.
    [Applied to stable] @@ -129,9 +129,9 @@ [Applied to stable]
  • Require spamd(8) control connections to originate from a reserved port.
  • Plug a pf(4) tables memory leak. -
  • Scale the altq(4) RED thresholds to 10% (min) and 30% (max) of the queue limit. +
  • Scale the altq(9) RED thresholds to 10% (min) and 30% (max) of the queue limit.
  • Fix a one-byte underflow in raidctl(8). -
  • Switch RSA blinding on for isakmpd(8), ssh-agent(1) and ssk-keysign(8). +
  • Switch RSA blinding on for isakmpd(8), ssh-agent(1) and ssh-keysign(8).
  • Still more sprintf -> snprintf and strcpy -> strlcpy in many, many places.
  • More strcpy -> strlcpy, this time in badsect(8), restore(8) and scsi(8). @@ -1175,7 +1175,7 @@
    OpenBSD www@openbsd.org -
    $OpenBSD: plus33.html,v 1.5 2003/04/13 16:19:11 deraadt Exp $ +
    $OpenBSD: plus33.html,v 1.6 2003/05/05 16:45:38 deraadt Exp $