[Midnightbsd-cvs] src [6881] stable/0.5: 0.5.3 RELEASE
laffer1 at midnightbsd.org
laffer1 at midnightbsd.org
Tue Oct 21 18:19:39 EDT 2014
Revision: 6881
http://svnweb.midnightbsd.org/src/?rev=6881
Author: laffer1
Date: 2014-10-21 18:19:39 -0400 (Tue, 21 Oct 2014)
Log Message:
-----------
0.5.3 RELEASE
Fix several security vulnerabilities in OpenSSL, routed, rtsold,
and namei with respect to Capsicum sandboxes looking up
nonexistent path names and leaking memory.
OpenSSL update adds some workarounds for the recent
poodle vulnerability reported by Google.
The input path in routed(8) will accept queries from any source and
attempt to answer them. However, the output path assumes that the
destination address for the response is on a directly connected
network.
Due to a missing length check in the code that handles DNS parameters,
a malformed router advertisement message can result in a stack buffer
overflow in rtsold(8).
Modified Paths:
--------------
stable/0.5/UPDATING
stable/0.5/sys/conf/newvers.sh
Modified: stable/0.5/UPDATING
===================================================================
--- stable/0.5/UPDATING 2014-10-21 22:14:30 UTC (rev 6880)
+++ stable/0.5/UPDATING 2014-10-21 22:19:39 UTC (rev 6881)
@@ -1,12 +1,32 @@
Updating Information for MidnightBSD users.
+20141021:
+ 0.5.3 RELEASE
+
+ Fix several security vulnerabilities in OpenSSL, routed, rtsold,
+ and namei with respect to Capsicum sandboxes looking up
+ nonexistent path names and leaking memory.
+
+ OpenSSL update adds some workarounds for the recent
+ poodle vulnerability reported by Google.
+
+ The input path in routed(8) will accept queries from any source and
+ attempt to answer them. However, the output path assumes that the
+ destination address for the response is on a directly connected
+ network.
+
+ Due to a missing length check in the code that handles DNS parameters,
+ a malformed router advertisement message can result in a stack buffer
+ overflow in rtsold(8).
+
20141011:
- 0.5.2
+ 0.5.2 RELEASE
mksh R50d - R50c had a regression with field splitting.
20141004:
- 0.5.1
+ 0.5.1 RELEASE
+
mksh R50c is a minor security update to fix an issue with the
handling of environment variables that could provide a limited
attack vector.
Modified: stable/0.5/sys/conf/newvers.sh
===================================================================
--- stable/0.5/sys/conf/newvers.sh 2014-10-21 22:14:30 UTC (rev 6880)
+++ stable/0.5/sys/conf/newvers.sh 2014-10-21 22:19:39 UTC (rev 6881)
@@ -32,7 +32,7 @@
# $MidnightBSD: src/sys/conf/newvers.sh,v 1.9 2012/10/07 14:18:18 laffer1 Exp $
TYPE="MidnightBSD"
-REVISION="0.5.2"
+REVISION="0.5.3"
BRANCH="RELEASE"
if [ "X${BRANCH_OVERRIDE}" != "X" ]; then
BRANCH=${BRANCH_OVERRIDE}
More information about the Midnightbsd-cvs
mailing list