Move RELENG_0_1 to stable/0.1
Security update for bzip2 integer overflow.
Correct a problem where function pointers for netgraph and bluetooth sockets are not initialized properly
IPv6 Neighbor Discovery Protocol routing vulnerability
ftpd security fix
Bump for ftpd security update.
MFC: ftpd command buffer vuln fix.
Add a new macro, sx_xlocked(), that returns true if the current thread holds an exclusive lock on the specified sx lock.
Fix a problem with OpenSSH which allows remote authenitcated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file. Obtained from OpenBSD/DragonFly. This only affects OpenSSH prior to 4.9 and thus does not affect CURRENT.
Bump MidnightBSD version for the OpenSSH patch.
OpenSSH fix.
Correct OpenSSH bug reported by Debian project.
The atheros driver should have had these options set as well. Fixes a tinderbox issue. This should never have hapened.
Modify tinderbox for MidnightBSD.
Fix sendfile issue where files with permissions for write only can be read.
Happy new year
Update copyright
Fix replay attack in random/urandom
Add nrelease, a way to build live cds from RELENG_0_1
More adjustments for 0.1.1 release build.
Changes used to build 0.1.1-RELEASE (with packages manually). This might be useful during the AMD64 build.
*** empty log message ***
a few changes for 0.1.1
Bump for 0.1.1 release The scheme doesn't handle .x.x releases well but this makes the most sense.
updated list of packages
Add additional packages including libiconv and libtool15 which were an issue in the last release.
Update for 0.1.1 release. Packages will go in that directory.
Forced commit to get mergemaster to generate the cf files.
Just a little $MidnightBSD$
clean up parenthesis
Prepare for 0.1.1
document openssl update.
Bump version as we've made many changes including a security update to openssl, bzip2, etc.
Fix a security issue with openssl. For applications using the SSL_get_shared_ciphers() function, the buffer overflow could allow an attacker to crash or potentially execute arbitrary code with the permissions of the user running the application. (freebsd advisory text).
forgot to mention libpthread fix.
Document bzip2 update and find changes.
Obtained from FreeBSD: Add -Btime, -Bnewer, -Bmin, -newerB[Bacmt], -newer[acmt]B options to work with the st_birthtime field of struct stat. 'B' has been chosen to match the format specifier from stat(1). $MidnightBSD$
MFC: bzip 1.0.4 (part 2 of 2)
MFC: bzip 1.0.4 (part 1 of 2)
MFC: stderr fix.
pkg_add and friends were fixed for mports. add that to updating
MFC: Added native support for @dirrmtry
Note the fix for bsd.port.mk.
0.1 was still using bsd.port.mk, instead of bsd.mport.mk. This caused breakages in ports because many ports have been updated to only work with bsd.mport.mk.
Fix the tag so it checks out RELENG_0_1 instead of CURRENT. Someone might be infor a nasty surprise without this.
Adjust for packages we'll end up including with the release
Prepare for 0.1-RELEASE
0.1-Release
Update MidnightBSD Version
Fix interaction with Windows 2000/XP servers. Directories with exactly 50 entries (newly created) can cause a weird error. This is noticable using rsync.
Remove documentation menus that we do not generate.
Source GNUstep shell scripts if they exist.
*** empty log message ***
Correct buffer overflow in tcpdump
use seperate packages for the 0.1 branch.
Fix libarchive tar extensions security vulnerability FreeBSD-SA-07:05.libarchive
Apply FreeBSD-SA-07:04.file as it effects us as well. Here is an excert from that advisory: When writing data into a buffer in the file_printf function, the length of the unused portion of the buffer is not correctly tracked, resulting in a buffer overflow when processing certain files.
Correct memory leak.
module name changed to mports-all
MFC ipv6 type 0 security patch.
$MidnightBSD$
This commit was manufactured by cvs2svn to create branch 'RELENG_0_1'.
libarchive 1.3.1
Zlib 1.2.3
fix lost file from server crash
fix groff
Imported from FreeBSD 6.1 beta sources
Imported from FreeBSD 6.0 sources