../
|
apache/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
bin/
|
6990
(9 years ago)
by laffer1:
update mksh to R50e as there are a number of regression bugs in the previous release that could cause users issues
|
cddl/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
contrib/
|
6990
(9 years ago)
by laffer1:
update mksh to R50e as there are a number of regression bugs in the previous release that could cause users issues
|
crypto/
|
6988
(9 years ago)
by laffer1:
Update to OpenSSL security patch to include CVE-2015-0209 and CVE-2015-0288
|
etc/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
games/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
gnu/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
include/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
kerberos5/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
lib/
|
6889
(9 years ago)
by laffer1:
only do major version for mport tool
|
libexec/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
nrelease/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
release/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
rescue/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
sbin/
|
6879
(9 years ago)
by laffer1:
The input path in routed(8) will accept queries from any source and
attempt to answer them. However, the output path assumes that the
destination address for the response is on a directly connected
network.
Obtained from: FreeBSD
|
secure/
|
6974
(9 years ago)
by laffer1:
MidnightBSD 0.5.10 RELEASE
Fixes several security issues with OpenSSL
See UPDATING for details.
|
share/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
sys/
|
6994
(9 years ago)
by laffer1:
0.5.11 RELEASE
Fix two security vulnerabilities:
The previous fix for IGMP had an overflow issue. This has been corrected.
ipv6: The Neighbor Discover Protocol allows a local router to advertise a
suggested Current Hop Limit value of a link, which will replace
Current Hop Limit on an interface connected to the link on the MidnightBSD
system.
Obtained from: FreeBSD
|
tools/
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
usr.bin/
|
6939
(9 years ago)
by laffer1:
fix symlink on amd64
|
usr.sbin/
|
6878
(9 years ago)
by laffer1:
Due to a missing length check in the code that handles DNS parameters,
a malformed router advertisement message can result in a stack buffer
overflow in rtsold(8).
Obtained from: FreeBSD
|
COPYRIGHT
|
6961
(9 years ago)
by laffer1:
0.5.8 RELEASE
Fix several security issues with OpenSSL.
A carefully crafted DTLS message can cause a segmentation fault in OpenSSL
due to a NULL pointer dereference. [CVE-2014-3571]
A memory leak can occur in the dtls1_buffer_record function under certain
conditions. [CVE-2015-0206]
When OpenSSL is built with the no-ssl3 option and a SSL v3 ClientHello is
received the ssl method would be set to NULL which could later result in
a NULL pointer dereference. [CVE-2014-3569]
An OpenSSL client will accept a handshake using an ephemeral ECDH
ciphersuite using an ECDSA certificate if the server key exchange message
is omitted. [CVE-2014-3572]
An OpenSSL client will accept the use of an RSA temporary key in a non-export
RSA key exchange ciphersuite. [CVE-2015-0204]
An OpenSSL server will accept a DH certificate for client authentication
without the certificate verify message. [CVE-2015-0205]
OpenSSL accepts several non-DER-variations of certificate signature
algorithm and signature encodings. OpenSSL also does not enforce a
match between the signature algorithm between the signed and unsigned
portions of the certificate. [CVE-2014-8275]
Bignum squaring (BN_sqr) may produce incorrect results on some
platforms, including x86_64. [CVE-2014-3570]
|
Makefile
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
Makefile.inc1
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
ObsoleteFiles.inc
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
README
|
6736
(9 years ago)
by laffer1:
Create 0.5 stable branch for upcoming 0.5-RELEASE
|
UPDATING
|
6994
(9 years ago)
by laffer1:
0.5.11 RELEASE
Fix two security vulnerabilities:
The previous fix for IGMP had an overflow issue. This has been corrected.
ipv6: The Neighbor Discover Protocol allows a local router to advertise a
suggested Current Hop Limit value of a link, which will replace
Current Hop Limit on an interface connected to the link on the MidnightBSD
system.
Obtained from: FreeBSD
|