ViewVC Help
View Directory | Revision Log | View Changeset | Root Listing
root/src/stable/0.5
File (rev) Last Change
 ../
usr.sbin/ 6878 (9 years ago) by laffer1: Due to a missing length check in the code that handles DNS parameters, a malformed router advertisement message can result in a stack buffer overflow in rtsold(8). Obtained from: FreeBSD
usr.bin/ 6939 (9 years ago) by laffer1: fix symlink on amd64
tools/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
sys/ 6994 (9 years ago) by laffer1: 0.5.11 RELEASE Fix two security vulnerabilities: The previous fix for IGMP had an overflow issue. This has been corrected. ipv6: The Neighbor Discover Protocol allows a local router to advertise a suggested Current Hop Limit value of a link, which will replace Current Hop Limit on an interface connected to the link on the MidnightBSD system. Obtained from: FreeBSD
share/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
secure/ 6974 (9 years ago) by laffer1: MidnightBSD 0.5.10 RELEASE Fixes several security issues with OpenSSL See UPDATING for details.
sbin/ 6879 (9 years ago) by laffer1: The input path in routed(8) will accept queries from any source and attempt to answer them. However, the output path assumes that the destination address for the response is on a directly connected network. Obtained from: FreeBSD
rescue/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
release/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
nrelease/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
libexec/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
lib/ 6889 (9 years ago) by laffer1: only do major version for mport tool
kerberos5/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
include/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
gnu/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
games/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
etc/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
crypto/ 6988 (9 years ago) by laffer1: Update to OpenSSL security patch to include CVE-2015-0209 and CVE-2015-0288
contrib/ 6990 (9 years ago) by laffer1: update mksh to R50e as there are a number of regression bugs in the previous release that could cause users issues
cddl/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
bin/ 6990 (9 years ago) by laffer1: update mksh to R50e as there are a number of regression bugs in the previous release that could cause users issues
apache/ 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
UPDATING 6994 (9 years ago) by laffer1: 0.5.11 RELEASE Fix two security vulnerabilities: The previous fix for IGMP had an overflow issue. This has been corrected. ipv6: The Neighbor Discover Protocol allows a local router to advertise a suggested Current Hop Limit value of a link, which will replace Current Hop Limit on an interface connected to the link on the MidnightBSD system. Obtained from: FreeBSD
README 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
ObsoleteFiles.inc 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
Makefile.inc1 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
Makefile 6736 (9 years ago) by laffer1: Create 0.5 stable branch for upcoming 0.5-RELEASE
COPYRIGHT 6961 (9 years ago) by laffer1: 0.5.8 RELEASE Fix several security issues with OpenSSL. A carefully crafted DTLS message can cause a segmentation fault in OpenSSL due to a NULL pointer dereference. [CVE-2014-3571] A memory leak can occur in the dtls1_buffer_record function under certain conditions. [CVE-2015-0206] When OpenSSL is built with the no-ssl3 option and a SSL v3 ClientHello is received the ssl method would be set to NULL which could later result in a NULL pointer dereference. [CVE-2014-3569] An OpenSSL client will accept a handshake using an ephemeral ECDH ciphersuite using an ECDSA certificate if the server key exchange message is omitted. [CVE-2014-3572] An OpenSSL client will accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. [CVE-2015-0204] An OpenSSL server will accept a DH certificate for client authentication without the certificate verify message. [CVE-2015-0205] OpenSSL accepts several non-DER-variations of certificate signature algorithm and signature encodings. OpenSSL also does not enforce a match between the signature algorithm between the signed and unsigned portions of the certificate. [CVE-2014-8275] Bignum squaring (BN_sqr) may produce incorrect results on some platforms, including x86_64. [CVE-2014-3570]
22 directories and 6 files shown

Properties

Name Value
svn:ignore _.tinderbox* _.amd64.* _.i386.* _sparc64.*