../
|
apache/
|
7363
(8 years ago)
by laffer1:
turn on the blocks runtime with libdispatch
|
bin/
|
7588
(7 years ago)
by laffer1:
switch to a void pointer here
|
cddl/
|
7047
(8 years ago)
by laffer1:
Introduce trim support for ZFS
|
contrib/
|
7657
(7 years ago)
by laffer1:
Merge sqlite3 3.13.0
|
crypto/
|
7583
(7 years ago)
by laffer1:
alrightythen just drop the 0 case
|
etc/
|
7645
(7 years ago)
by laffer1:
increase default to 1M. we have several processes that do not work without this.
|
games/
|
6469
(10 years ago)
by laffer1:
remove cvs2svn prop
|
gnu/
|
7459
(8 years ago)
by laffer1:
we have gone to plaid
|
include/
|
7396
(8 years ago)
by laffer1:
add apple/mach headers
|
kerberos5/
|
7177
(8 years ago)
by laffer1:
tag
|
lib/
|
7661
(7 years ago)
by laffer1:
add logging to syslog when a package fails to install. Refactor several parts of do_actual_install into their own functions. Add error handling for sample files.
|
libexec/
|
7399
(8 years ago)
by laffer1:
enable blocks for mport utilities
|
nrelease/
|
6469
(10 years ago)
by laffer1:
remove cvs2svn prop
|
release/
|
6469
(10 years ago)
by laffer1:
remove cvs2svn prop
|
rescue/
|
6469
(10 years ago)
by laffer1:
remove cvs2svn prop
|
sbin/
|
7602
(7 years ago)
by laffer1:
init to zero
|
secure/
|
7462
(8 years ago)
by laffer1:
Security patch OpenSSL for DROWN
A cross-protocol attack was discovered that could lead to decryption of TLS
sessions by using a server supporting SSLv2 and EXPORT cipher suites as a
Bleichenbacher RSA padding oracle. Note that traffic between clients and
non-vulnerable servers can be decrypted provided another server supporting
SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP
or POP3) shares the RSA keys of the non-vulnerable server. This vulnerability
is known as DROWN. [CVE-2016-0800]
A double free bug was discovered when OpenSSL parses malformed DSA private
keys and could lead to a DoS attack or memory corruption for applications that
receive DSA private keys from untrusted sources. This scenario is considered
rare. [CVE-2016-0705]
The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory
management semantics; the returned pointer was sometimes newly allocated, and
sometimes owned by the callee. The calling code has no way of distinguishing
these two cases. [CVE-2016-0798]
In the BN_hex2bn function, the number of hex digits is calculated using an int
value |i|. Later |bn_expand| is called with a value of |i * 4|. For large
values of |i| this can result in |bn_expand| not allocating any memory because
|i * 4| is negative. This can leave the internal BIGNUM data field as NULL
leading to a subsequent NULL pointer dereference. For very large values of
|i|, the calculation |i * 4| could be a positive value smaller than |i|. In
this case memory is allocated to the internal BIGNUM data field, but it is
insufficiently sized leading to heap corruption. A similar issue exists in
BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn is
ever called by user applications with very large untrusted hex/dec data. This
is anticipated to be a rare occurrence. [CVE-2016-0797]
The internal |fmtstr| function used in processing a "%s" formatted string in
the BIO_*printf functions could overflow while calculating the length of
a string and cause an out-of-bounds read when printing very long strings.
[CVE-2016-0799]
A side-channel attack was found which makes use of cache-bank conflicts on the
Intel Sandy-Bridge microarchitecture which could lead to the recovery of RSA
keys. [CVE-2016-0702]
s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers.
If clear-key bytes are present for these ciphers, they displace encrypted-key
bytes. [CVE-2016-0703]
s2_srvr.c overwrites the wrong bytes in the master key when applying
Bleichenbacher protection for export cipher suites. [CVE-2016-0704]
Obtained from: OpenSSL & FreeBSD
|
share/
|
7542
(8 years ago)
by laffer1:
fix bmake compatibility
|
sys/
|
7614
(7 years ago)
by laffer1:
zero out structure for legacy bsd43 stat(2) system call
|
tools/
|
7461
(8 years ago)
by laffer1:
sync tinderbox with DES version 2.22 from May 2014
|
usr.bin/
|
7642
(7 years ago)
by laffer1:
sanity checks to prevent attackers from writing data
|
usr.sbin/
|
7641
(7 years ago)
by laffer1:
sync daemon(3) with freebsd 10 stable. note the new -P flag
|
COPYRIGHT
|
7391
(8 years ago)
by laffer1:
Happy New Year.
|
Makefile
|
7636
(7 years ago)
by laffer1:
make check time work with newer make
|
Makefile.inc1
|
7637
(7 years ago)
by laffer1:
get rid of errors when running make with netbsd make
|
ObsoleteFiles.inc
|
7635
(7 years ago)
by laffer1:
add old files to remove to current
|
README
|
6517
(10 years ago)
by laffer1:
turn on svn keywords
|
UPDATING
|
7658
(7 years ago)
by laffer1:
document recent changes
|