MidnightBSD 0.6.4 OpenSSH Fix two security vulnerabilities: OpenSSH clients does not correctly verify DNS SSHFP records when a server offers a certificate. [CVE-2014-2653] OpenSSH servers which are configured to allow password authentication using PAM (default) would allow many password attempts. A bug allows MaxAuthTries to be bypassed. [CVE-2015-5600]
MidnightBSD 0.6.3 RELEASE TCP connections transitioning to the LAST_ACK state can become permanently stuck due to mishandling of protocol state in certain situations, which in turn can lead to accumulated consumption and eventual exhaustion of system resources, such as mbufs and sockets.
MFC: Trim support for ZFS
bump version for OpenSSL patch
Create stable branch for MidnightBSD 0.6
we no longer do branches so uname output is condensed and conforms to most other unices.
set keywords
add compiler version
0.6-CURRENT now
0.5-CURRENT now
use SYSDIR rather than dirname + relative path
Sync some things with freebsd 9 stable
Move things along.. current is now 0.4-CURRENT. Change the man pages, osreldate and other tunables in the system accordingly. While we're here, update other bsd systems in our mdoc.local.
revert to 0.3 as discussed with ctriv@
Switch version information. We're starting at 1.0-CURRENT now.
Change over to using __MidnightBSDversion as discussed with ctriv. Switch to 0.3-CURRENT
Update to 0.2-CURRENT
Added cvs header.
This commit was generated by cvs2svn to compensate for changes in r5, which included commits to RCS files with non-trunk default branches.
Imported from FreeBSD 6.1 beta sources
Imported from FreeBSD 6.0 sources
This form allows you to request diffs between any two revisions of this file. For each of the two "sides" of the diff, enter a numeric revision.