ViewVC Help
View Directory | Revision Log | View Changeset | Root Listing
root/src/stable
Revision 6915 - Directory Listing - [select for diffs]
Modified Sat Nov 1 15:52:44 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6914
fix date of 0.5.4

Revision 6914 - Directory Listing - [select for diffs]
Modified Sat Nov 1 07:00:31 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6909
false

Revision 6909 - Directory Listing - [select for diffs]
Modified Fri Oct 31 23:21:12 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6900
0.5.5 RELEASE fixes an issue with tnftp by updating to the latest release 20141031. See CVE-2014-8517 for details

Revision 6900 - Directory Listing - [select for diffs]
Modified Thu Oct 30 00:32:09 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6890
ignore gdbm

Revision 6890 - Directory Listing - [select for diffs]
Modified Mon Oct 27 23:33:40 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6889
bump os version for mport fix

Revision 6889 - Directory Listing - [select for diffs]
Modified Mon Oct 27 23:32:24 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6881
only do major version for mport tool

Revision 6881 - Directory Listing - [select for diffs]
Modified Tue Oct 21 22:19:39 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6880
   0.5.3 RELEASE

        Fix several security vulnerabilities in OpenSSL, routed, rtsold,
        and namei with respect to Capsicum sandboxes looking up
        nonexistent path names and leaking memory.

        OpenSSL update adds some workarounds for the recent
        poodle vulnerability reported by Google.

        The input path in routed(8) will accept queries from any source and
        attempt to answer them.  However, the output path assumes that the
        destination address for the response is on a directly connected
        network.

        Due to a missing length check in the code that handles DNS parameters,
        a malformed router advertisement message can result in a stack buffer
        overflow in rtsold(8).

Revision 6880 - Directory Listing - [select for diffs]
Modified Tue Oct 21 22:14:30 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6879
The namei facility will leak a small amount of kernel memory every
time a sandboxed process looks up a nonexistent path name.

Obtained from: FreeBSD

Revision 6879 - Directory Listing - [select for diffs]
Modified Tue Oct 21 22:13:27 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6878
The input path in routed(8) will accept queries from any source and
attempt to answer them.  However, the output path assumes that the
destination address for the response is on a directly connected
network.

Obtained from: FreeBSD

Revision 6878 - Directory Listing - [select for diffs]
Modified Tue Oct 21 22:12:05 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6877
Due to a missing length check in the code that handles DNS parameters,
a malformed router advertisement message can result in a stack buffer
overflow in rtsold(8).

Obtained from: FreeBSD

Revision 6877 - Directory Listing - [select for diffs]
Modified Tue Oct 21 22:09:49 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6854
A flaw in the DTLS SRTP extension parsing code allows an attacker, who
sends a carefully crafted handshake message, to cause OpenSSL to fail
to free up to 64k of memory causing a memory leak.  [CVE-2014-3513].

When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak.  [CVE-2014-3567].

The SSL protocol 3.0, as supported in OpenSSL and other products, supports
CBC mode encryption where it could not adequately check the integrity of
padding, because of the use of non-deterministic CBC padding.  This
protocol weakness makes it possible for an attacker to obtain clear text
data through a padding-oracle attack.

Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE [CVE-2014-3566].

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol downgrade.

When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them. [CVE-2014-3568].

Obtained from: OpenSSL, FreeBSD

Revision 6854 - Directory Listing - [select for diffs]
Modified Sat Oct 11 13:37:44 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6852
MFC: fix units for terabyte suffix with find

Revision 6852 - Directory Listing - [select for diffs]
Modified Sat Oct 11 12:44:51 2014 UTC (9 years, 6 months ago) by laffer1
Diff to previous 6842
0.5.2 - fix a regression with the mksh hotfix

Revision 6842 - Directory Listing - [select for diffs]
Modified Sat Oct 4 18:39:09 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6774
0.5.1-RELEASE is a security update for mksh

Revision 6774 - Directory Listing - [select for diffs]
Modified Fri Sep 19 21:44:34 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6769
MidnightBSD 0.5-RELEASE

Revision 6769 - Directory Listing - [select for diffs]
Modified Tue Sep 16 23:49:28 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6767
0.4-RELEASE-p15

20140916:
        Fix a security issue with TCP SYN.

        When a segment with the SYN flag for an already existing connection arrives,
        the TCP stack tears down the connection, bypassing a check that the
        sequence number in the segment is in the expected window.

Revision 6767 - Directory Listing - [select for diffs]
Modified Tue Sep 16 23:41:17 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6756
20140916:
        Fix a security issue with TCP SYN.

        When a segment with the SYN flag for an already existing connection arrives,
        the TCP stack tears down the connection, bypassing a check that the
        sequence number in the segment is in the expected window.

Obtained from: FreeBSD

Revision 6756 - Directory Listing - [select for diffs]
Modified Tue Sep 9 23:26:28 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6755
0.4-RELEASE-p14

OpenSSL security patch:

        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
        to consume large amounts of memory. [CVE-2014-3506]

        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
        memory. [CVE-2014-3507]

        A flaw in OBJ_obj2txt may cause pretty printing functions such as
        X509_name_oneline, X509_name_print_ex et al. to leak some information from
        the stack. [CVE-2014-3508]

        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
        a denial of service attack. [CVE-2014-3510]

Revision 6755 - Directory Listing - [select for diffs]
Modified Tue Sep 9 23:15:28 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6753
OpenSSL security patch:

        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
        to consume large amounts of memory. [CVE-2014-3506]

        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
        memory. [CVE-2014-3507]

        A flaw in OBJ_obj2txt may cause pretty printing functions such as
        X509_name_oneline, X509_name_print_ex et al. to leak some information from
        the stack. [CVE-2014-3508]

        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
        a denial of service attack. [CVE-2014-3510]

Revision 6753 - Directory Listing - [select for diffs]
Modified Tue Sep 9 21:44:45 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6752
note clearenv(3)

Revision 6752 - Directory Listing - [select for diffs]
Modified Tue Sep 9 21:42:32 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6751
mark as prerelease

Revision 6751 - Directory Listing - [select for diffs]
Modified Tue Sep 9 21:38:22 2014 UTC (9 years, 7 months ago) by laffer1
Diff to previous 6743
MFC: fix clearenv(3)

Revision 6743 - Directory Listing - [select for diffs]
Modified Wed Sep 3 12:19:23 2014 UTC (9 years, 8 months ago) by laffer1
Diff to previous 6741
note we're on prerelease.

Revision 6741 - Directory Listing - [select for diffs]
Modified Wed Sep 3 12:07:46 2014 UTC (9 years, 8 months ago) by laffer1
Diff to previous 6736
drop cvs2svn prop

Revision 6736 - Directory Listing - [select for diffs]
Modified Tue Sep 2 22:17:40 2014 UTC (9 years, 8 months ago) by laffer1
Diff to previous 6714
Create 0.5 stable branch for upcoming 0.5-RELEASE

Revision 6714 - Directory Listing - [select for diffs]
Modified Thu Jul 10 12:22:47 2014 UTC (9 years, 9 months ago) by laffer1
Diff to previous 6658
MidnightBSD 0.4-RELEASE-p13  Fix a vulnerability in the control message API. A buffer is not properly cleared.

Revision 6658 - Directory Listing - [select for diffs]
Modified Fri Jun 6 00:11:23 2014 UTC (9 years, 11 months ago) by laffer1
Diff to previous 6655
MidnightBSD 0.4-RELEASE-p12

Revision 6655 - Directory Listing - [select for diffs]
Modified Wed Jun 4 12:20:28 2014 UTC (9 years, 11 months ago) by laffer1
Diff to previous 6653
MidnightBSD 0.4-RELEASE-p11

Security updates for sendmail and ktrace.  See UPDATING.

Revision 6653 - Directory Listing - [select for diffs]
Modified Wed Apr 30 12:23:07 2014 UTC (10 years ago) by laffer1
Diff to previous 6633
MidnightBSD 0.4-RELEASE-p10

        Fix a TCP reassembly bug that could result in a DOS attack
        of the system. It may be possible to obtain portions
        of kernel memory as well.

Revision 6633 - Directory Listing - [select for diffs]
Modified Wed Apr 9 11:48:24 2014 UTC (10 years ago) by laffer1
Diff to previous 6631
0.4-RELEASE-p9

Fix a security issue affecting NFS server where a trusted client can deadlock the server.

Revision 6631 - Directory Listing - [select for diffs]
Modified Wed Apr 9 11:43:39 2014 UTC (10 years ago) by laffer1
Diff to previous 6630
0.4-p8 openssl fix.

Revision 6630 - Directory Listing - [select for diffs]
Modified Wed Apr 9 11:40:59 2014 UTC (10 years ago) by laffer1
Diff to previous 6615
Fix CVE-2014-0076 in OpenSSL

Revision 6615 - Directory Listing - [select for diffs]
Modified Sat Mar 8 21:36:04 2014 UTC (10 years, 1 month ago) by laffer1
Diff to previous 6608
remove cvs2svn:cvs-rev prop

Revision 6608 - Directory Listing - [select for diffs]
Modified Sat Feb 1 22:08:58 2014 UTC (10 years, 3 months ago) by laffer1
Diff to previous 6607
document dot.profile fix.

Revision 6607 - Directory Listing - [select for diffs]
Modified Sat Feb 1 22:06:48 2014 UTC (10 years, 3 months ago) by laffer1
Diff to previous 6600
-s flag missing from ssh-agent on startup. this causes a lot of duplicate ssh-agent

Revision 6600 - Directory Listing - [select for diffs]
Modified Wed Jan 15 00:56:49 2014 UTC (10 years, 3 months ago) by laffer1
Diff to previous 6071
security update

Revision 6071 - Directory Listing - [select for diffs]
Modified Sat Nov 30 03:06:34 2013 UTC (10 years, 5 months ago) by laffer1
Diff to previous 6070
Move RELENG_0_1 to stable/0.1

Revision 6070 - Directory Listing - [select for diffs]
Modified Sat Nov 30 03:05:58 2013 UTC (10 years, 5 months ago) by laffer1
Diff to previous 6069
Move RELENG_0_2 to stable/0.2

Revision 6069 - Directory Listing - [select for diffs]
Modified Sat Nov 30 03:05:29 2013 UTC (10 years, 5 months ago) by laffer1
Diff to previous 6068
Move RELENG_0_3 to stable/0.3

Revision 6068 - Directory Listing - [select for diffs]
Modified Sat Nov 30 03:04:40 2013 UTC (10 years, 5 months ago) by laffer1
Diff to previous 6067
Move RELENG_0_4 to stable/0.4

Revision 6067 - Directory Listing - [select for diffs]
Added Sat Nov 30 03:03:37 2013 UTC (10 years, 5 months ago) by laffer1
Create stable directory for storing RELENG_0_N branches, etc. 

Convenience Links