../
|
apache/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
bin/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
cddl/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
contrib/
|
6655
(9 years ago)
by laffer1:
MidnightBSD 0.4-RELEASE-p11
Security updates for sendmail and ktrace. See UPDATING.
|
crypto/
|
6756
(9 years ago)
by laffer1:
0.4-RELEASE-p14
OpenSSL security patch:
The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
to consume large amounts of memory. [CVE-2014-3506]
The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
memory. [CVE-2014-3507]
A flaw in OBJ_obj2txt may cause pretty printing functions such as
X509_name_oneline, X509_name_print_ex et al. to leak some information from
the stack. [CVE-2014-3508]
OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
a denial of service attack. [CVE-2014-3510]
|
etc/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
games/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
gnu/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
include/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
kerberos5/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
lib/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
libexec/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
nrelease/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
release/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
rescue/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
sbin/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
secure/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
share/
|
6607
(10 years ago)
by laffer1:
-s flag missing from ssh-agent on startup. this causes a lot of duplicate ssh-agent
|
sys/
|
6769
(9 years ago)
by laffer1:
0.4-RELEASE-p15
20140916:
Fix a security issue with TCP SYN.
When a segment with the SYN flag for an already existing connection arrives,
the TCP stack tears down the connection, bypassing a check that the
sequence number in the segment is in the expected window.
|
tools/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
usr.bin/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
usr.sbin/
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
COPYRIGHT
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
Makefile
|
6741
(9 years ago)
by laffer1:
drop cvs2svn prop
|
Makefile.inc1
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
ObsoleteFiles.inc
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
README
|
6068
(10 years ago)
by laffer1:
Move RELENG_0_4 to stable/0.4
|
UPDATING
|
6769
(9 years ago)
by laffer1:
0.4-RELEASE-p15
20140916:
Fix a security issue with TCP SYN.
When a segment with the SYN flag for an already existing connection arrives,
the TCP stack tears down the connection, bypassing a check that the
sequence number in the segment is in the expected window.
|