<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test, branch releng/7.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test/atom?h=releng%2F7.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test/atom?h=releng%2F7.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/'/>
<updated>2009-04-22T14:07:14Z</updated>
<entry>
<title>Don't leak information via uninitialized space in db(3) records. [09:07]</title>
<updated>2009-04-22T14:07:14Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2009-04-22T14:07:14Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=57895cdc764809ad29336431ee6b43c68fe15f15'/>
<id>urn:sha1:57895cdc764809ad29336431ee6b43c68fe15f15</id>
<content type='text'>
Sanity-check string lengths in order to stop OpenSSL crashing
when printing corrupt BMPString or UniversalString objects. [09:08]

Security:	FreeBSD-SA-09:07.libc
Security:	FreeBSD-SA-09:08.openssl
Security:	CVE-2009-0590
Approved by:	re (kensmith)
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Correctly sanity-check timer IDs. [SA-09:06]</title>
<updated>2009-03-23T00:00:50Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2009-03-23T00:00:50Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=cff0c03ef7b93d6ab09a8ce2ab009348e5c7aecd'/>
<id>urn:sha1:cff0c03ef7b93d6ab09a8ce2ab009348e5c7aecd</id>
<content type='text'>
Limit the size of malloced buffer when dumping environment
variables. [EN-09:01]

Approved by:	so (cperciva)
Approved by:	re (kensmith)
Security:	FreeBSD-SA-09:06.ktimer
Errata:		FreeBSD-EN-09:01.kenv
</content>
</entry>
<entry>
<title>Correctly scrub telnetd's environment.</title>
<updated>2009-02-16T21:56:17Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2009-02-16T21:56:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=bb602bfc7c7d3bf85832427c2e5f1d836d318194'/>
<id>urn:sha1:bb602bfc7c7d3bf85832427c2e5f1d836d318194</id>
<content type='text'>
Approved by:	so (cperciva)
Security:	FreeBSD-SA-09:05.telnetd
</content>
</entry>
<entry>
<title>Correct ntpd(8) cryptographic signature bypass [SA-09:04].</title>
<updated>2009-01-13T21:19:27Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2009-01-13T21:19:27Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=a5718404886956d936e753a6a5a314eefbf064eb'/>
<id>urn:sha1:a5718404886956d936e753a6a5a314eefbf064eb</id>
<content type='text'>
Correct BIND DNSSEC incorrect checks for malformed signatures
[SA-09:04].

Security:	FreeBSD-SA-09:03.ntpd
Security:	FreeBSD-SA-09:04.bind
Obtained from:	ISC [SA-09:04]
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Prevent cross-site forgery attacks on lukemftpd(8) due to splitting</title>
<updated>2009-01-07T20:17:55Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2009-01-07T20:17:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=636b4dcc16aaafd36ca1dec5ff590cd41b16adcf'/>
<id>urn:sha1:636b4dcc16aaafd36ca1dec5ff590cd41b16adcf</id>
<content type='text'>
long commands into multiple requests. [09:01]

Fix incorrect OpenSSL checks for malformed signatures due to invalid
check of return value from EVP_VerifyFinal(), DSA_verify, and
DSA_do_verify. [09:02]

Security:	FreeBSD-SA-09:01.lukemftpd
Security:	FreeBSD-SA-09:02.openssl
Obtained from:	NetBSD [SA-09:01]
Obtained from:	OpenSSL Project [SA-09:02]
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Prevent cross-site forgery attacks on ftpd(8) due to splitting</title>
<updated>2008-12-23T01:23:09Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2008-12-23T01:23:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=343d9769a6eb6d6039f02009d366e378660324a7'/>
<id>urn:sha1:343d9769a6eb6d6039f02009d366e378660324a7</id>
<content type='text'>
long commands into multiple requests. [08:12]

Avoid calling uninitialized function pointers in protocol switch
code. [08:13]

Merry Christmas everybody...

Approved by:	so (cperciva)
Approved by:	re (kensmith)
Security:	FreeBSD-SA-08:12.ftpd, FreeBSD-SA-08:13.protosw
</content>
</entry>
<entry>
<title>Make sure arc4random(9) is properly seeded when /etc/rc.d/initrandom returns.</title>
<updated>2008-11-24T17:39:39Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2008-11-24T17:39:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=17ce22e780ff6b4a6c7fdd0fa9e2b815c32f4435'/>
<id>urn:sha1:17ce22e780ff6b4a6c7fdd0fa9e2b815c32f4435</id>
<content type='text'>
Approved by:	so (cperciva)
Approved by:	re (kensmith)
Security:	FreeBSD-SA-08:11.arc4random
</content>
</entry>
<entry>
<title>Default to ignoring potentially evil IPv6 Neighbor Solicitation</title>
<updated>2008-10-02T00:32:59Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2008-10-02T00:32:59Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=1258eef80a18251e2f72b12d27b21b656b800d71'/>
<id>urn:sha1:1258eef80a18251e2f72b12d27b21b656b800d71</id>
<content type='text'>
messages.

Approved by:    so (cperciva)
Approved by:	re (kensmith)
Security:       FreeBSD-SA-08:10.nd6
Thanks to:      jinmei, bz
</content>
</entry>
<entry>
<title>- Fix amd64 local privilege escalation. [08:07]</title>
<updated>2008-09-03T19:09:47Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2008-09-03T19:09:47Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=24b7af9d008ffd6d8ed237a9f60d1e50ef4086e8'/>
<id>urn:sha1:24b7af9d008ffd6d8ed237a9f60d1e50ef4086e8</id>
<content type='text'>
- Fix nmount(2) local privilege escalation. [08:08]
- Fix IPv6 remote kernel panics. [08:09]

Fix for [08:07] is merge of r181823.

Submitted by:	kib [08:07], csjp [08:08], bz [08:09]
Reviewed by:	peter [08:07], jhb [08:07]
Reviewed by:	jinmei [08:09], rwatson [08:09]
Approved by:	re (SA blanket)
Approved by:	so (simon)
Security:	FreeBSD-SA-08:07.amd64
Security:	FreeBSD-SA-08:08.nmount
Security:	FreeBSD-SA-08:09.icmp6
</content>
</entry>
<entry>
<title>Improve randomization in BIND to prevent response spoofing.</title>
<updated>2008-07-13T18:42:38Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2008-07-13T18:42:38Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=b1f3875d97266ccf14704af848bf9baa09c499b9'/>
<id>urn:sha1:b1f3875d97266ccf14704af848bf9baa09c499b9</id>
<content type='text'>
Security:	FreeBSD-SA-08:06.bind
Approved by:	so (cperciva)
Thanks to:	remko, csjp
No thanks to:	bronchitis
</content>
</entry>
</feed>
