../
|
usr.sbin/
|
8328
(7 years ago)
by laffer1:
remove duplicate ;
|
usr.bin/
|
8307
(7 years ago)
by laffer1:
fix example
|
tools/
|
8281
(7 years ago)
by laffer1:
cleanup
|
sys/
|
8335
(7 years ago)
by laffer1:
add detection of serial console presense
|
share/
|
8337
(7 years ago)
by laffer1:
add man page
|
secure/
|
7462
(8 years ago)
by laffer1:
Security patch OpenSSL for DROWN
A cross-protocol attack was discovered that could lead to decryption of TLS
sessions by using a server supporting SSLv2 and EXPORT cipher suites as a
Bleichenbacher RSA padding oracle. Note that traffic between clients and
non-vulnerable servers can be decrypted provided another server supporting
SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP
or POP3) shares the RSA keys of the non-vulnerable server. This vulnerability
is known as DROWN. [CVE-2016-0800]
A double free bug was discovered when OpenSSL parses malformed DSA private
keys and could lead to a DoS attack or memory corruption for applications that
receive DSA private keys from untrusted sources. This scenario is considered
rare. [CVE-2016-0705]
The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory
management semantics; the returned pointer was sometimes newly allocated, and
sometimes owned by the callee. The calling code has no way of distinguishing
these two cases. [CVE-2016-0798]
In the BN_hex2bn function, the number of hex digits is calculated using an int
value |i|. Later |bn_expand| is called with a value of |i * 4|. For large
values of |i| this can result in |bn_expand| not allocating any memory because
|i * 4| is negative. This can leave the internal BIGNUM data field as NULL
leading to a subsequent NULL pointer dereference. For very large values of
|i|, the calculation |i * 4| could be a positive value smaller than |i|. In
this case memory is allocated to the internal BIGNUM data field, but it is
insufficiently sized leading to heap corruption. A similar issue exists in
BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn is
ever called by user applications with very large untrusted hex/dec data. This
is anticipated to be a rare occurrence. [CVE-2016-0797]
The internal |fmtstr| function used in processing a "%s" formatted string in
the BIO_*printf functions could overflow while calculating the length of
a string and cause an out-of-bounds read when printing very long strings.
[CVE-2016-0799]
A side-channel attack was found which makes use of cache-bank conflicts on the
Intel Sandy-Bridge microarchitecture which could lead to the recovery of RSA
keys. [CVE-2016-0702]
s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers.
If clear-key bytes are present for these ciphers, they displace encrypted-key
bytes. [CVE-2016-0703]
s2_srvr.c overwrites the wrong bytes in the master key when applying
Bleichenbacher protection for export cipher suites. [CVE-2016-0704]
Obtained from: OpenSSL & FreeBSD
|
sbin/
|
8328
(7 years ago)
by laffer1:
remove duplicate ;
|
rescue/
|
8155
(7 years ago)
by laffer1:
partial revert of last commit
|
release/
|
7801
(7 years ago)
by laffer1:
add additional exclusions to src tarball
|
nrelease/
|
6469
(10 years ago)
by laffer1:
remove cvs2svn prop
|
libexec/
|
8282
(7 years ago)
by laffer1:
check the return error of set[e][ug]id
|
lib/
|
8328
(7 years ago)
by laffer1:
remove duplicate ;
|
kerberos5/
|
8155
(7 years ago)
by laffer1:
partial revert of last commit
|
include/
|
8175
(7 years ago)
by laffer1:
rpc: convert all uid and gid variables to u_int.
|
gnu/
|
8311
(7 years ago)
by laffer1:
fix flags.
|
games/
|
8277
(7 years ago)
by laffer1:
free buf when no longer used
|
etc/
|
8327
(7 years ago)
by laffer1:
dont fail with exit 1
|
crypto/
|
7583
(8 years ago)
by laffer1:
alrightythen just drop the 0 case
|
contrib/
|
8336
(7 years ago)
by laffer1:
add missing files
|
cddl/
|
8211
(7 years ago)
by laffer1:
we do not support -r
|
bin/
|
8178
(7 years ago)
by laffer1:
Add a -h flag similar to the -h flag for ln to force mv(1) to treat a
symbolic link to a directory for the target as a symbolic link instead of
a directory. This makes it possible to atomically update a symbolic
link using rename().
|
apache/
|
7721
(7 years ago)
by laffer1:
update cstd
|
UPDATING
|
8153
(7 years ago)
by laffer1:
note via change
|
README
|
6517
(10 years ago)
by laffer1:
turn on svn keywords
|
ObsoleteFiles.inc
|
7635
(7 years ago)
by laffer1:
add old files to remove to current
|
Makefile.inc1
|
8223
(7 years ago)
by laffer1:
various fixes to WITH_CTF
|
Makefile
|
7636
(7 years ago)
by laffer1:
make check time work with newer make
|
COPYRIGHT
|
7391
(8 years ago)
by laffer1:
Happy New Year.
|