../
|
apache/
|
7721
(7 years ago)
by laffer1:
update cstd
|
bin/
|
8150
(7 years ago)
by laffer1:
add a pointer
|
cddl/
|
8118
(7 years ago)
by laffer1:
cleanup linking
|
contrib/
|
8053
(7 years ago)
by laffer1:
fix corrupted dwar expression from kgdb
|
crypto/
|
7583
(7 years ago)
by laffer1:
alrightythen just drop the 0 case
|
etc/
|
8135
(7 years ago)
by laffer1:
improve moused when used with usb devices
|
games/
|
7841
(7 years ago)
by laffer1:
fix fortune
|
gnu/
|
8028
(7 years ago)
by laffer1:
try to sync up libcxxrt handling
|
include/
|
8130
(7 years ago)
by laffer1:
rpc.lockd is still freaking out. revert this
|
kerberos5/
|
7177
(8 years ago)
by laffer1:
tag
|
lib/
|
8146
(7 years ago)
by laffer1:
make more clear
|
libexec/
|
8097
(7 years ago)
by laffer1:
do not reference z_nodeflib for not objgiven case, thus fixing LD_PRELOAD for a non absolute path
|
nrelease/
|
6469
(10 years ago)
by laffer1:
remove cvs2svn prop
|
release/
|
7801
(7 years ago)
by laffer1:
add additional exclusions to src tarball
|
rescue/
|
6469
(10 years ago)
by laffer1:
remove cvs2svn prop
|
sbin/
|
8132
(7 years ago)
by laffer1:
link ipfilter(4) and ipfilter(5) to the build
|
secure/
|
7462
(8 years ago)
by laffer1:
Security patch OpenSSL for DROWN
A cross-protocol attack was discovered that could lead to decryption of TLS
sessions by using a server supporting SSLv2 and EXPORT cipher suites as a
Bleichenbacher RSA padding oracle. Note that traffic between clients and
non-vulnerable servers can be decrypted provided another server supporting
SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP
or POP3) shares the RSA keys of the non-vulnerable server. This vulnerability
is known as DROWN. [CVE-2016-0800]
A double free bug was discovered when OpenSSL parses malformed DSA private
keys and could lead to a DoS attack or memory corruption for applications that
receive DSA private keys from untrusted sources. This scenario is considered
rare. [CVE-2016-0705]
The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory
management semantics; the returned pointer was sometimes newly allocated, and
sometimes owned by the callee. The calling code has no way of distinguishing
these two cases. [CVE-2016-0798]
In the BN_hex2bn function, the number of hex digits is calculated using an int
value |i|. Later |bn_expand| is called with a value of |i * 4|. For large
values of |i| this can result in |bn_expand| not allocating any memory because
|i * 4| is negative. This can leave the internal BIGNUM data field as NULL
leading to a subsequent NULL pointer dereference. For very large values of
|i|, the calculation |i * 4| could be a positive value smaller than |i|. In
this case memory is allocated to the internal BIGNUM data field, but it is
insufficiently sized leading to heap corruption. A similar issue exists in
BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn is
ever called by user applications with very large untrusted hex/dec data. This
is anticipated to be a rare occurrence. [CVE-2016-0797]
The internal |fmtstr| function used in processing a "%s" formatted string in
the BIO_*printf functions could overflow while calculating the length of
a string and cause an out-of-bounds read when printing very long strings.
[CVE-2016-0799]
A side-channel attack was found which makes use of cache-bank conflicts on the
Intel Sandy-Bridge microarchitecture which could lead to the recovery of RSA
keys. [CVE-2016-0702]
s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers.
If clear-key bytes are present for these ciphers, they displace encrypted-key
bytes. [CVE-2016-0703]
s2_srvr.c overwrites the wrong bytes in the master key when applying
Bleichenbacher protection for export cipher suites. [CVE-2016-0704]
Obtained from: OpenSSL & FreeBSD
|
share/
|
8147
(7 years ago)
by laffer1:
remove all cvsup examples. we no longer offer this service
|
sys/
|
8142
(7 years ago)
by laffer1:
shorten name so it fits
|
tools/
|
8114
(7 years ago)
by laffer1:
remove cvs only tools
|
usr.bin/
|
8144
(7 years ago)
by laffer1:
- Use pid_t type instead of just int.
- Put arguments for print_syscall_ret() function in proper order.
Bug was introduced in r192025.
- Remove unused variables.
- Fix warnings about comparing signed and unsigned ints.
- Style(9) cleanup.
- Remove unused variables.
- Remove redundant return after err(3) call.
- Fix detaching under some circumstances.
When truss is detaching from very active process it is possible to
hang on waitpid(2) in restore_proc() forever, because
ptrace(PT_SYSCALL) must be called before detaching, to allow the
debugging process to continue execution. Also when truss called with
'-c' argument, it does not print anything after detach, because it
immediately exits from restore_proc().
To fix these two problems make detaching deferred, but then it is
impossible to detach from a process which does not do any system call.
To fix this issue use sigaction(2) instead of signal(3) to disable
SA_RESTART flag for waitpid(2) that makes it non-restartable. Remove
global variable child_pid, because now detaching is handled in context
where child's pid is known.
- Make truss thread-aware.
|
usr.sbin/
|
8145
(7 years ago)
by laffer1:
document security
|
COPYRIGHT
|
7391
(8 years ago)
by laffer1:
Happy New Year.
|
Makefile
|
7636
(7 years ago)
by laffer1:
make check time work with newer make
|
Makefile.inc1
|
8026
(7 years ago)
by laffer1:
fix distribute world when games is not enabled.
|
ObsoleteFiles.inc
|
7635
(7 years ago)
by laffer1:
add old files to remove to current
|
README
|
6517
(10 years ago)
by laffer1:
turn on svn keywords
|
UPDATING
|
7831
(7 years ago)
by laffer1:
document samsung 840 pro fix
|