<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2, branch releng/5.3</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F5.3</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F5.3'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2006-09-30T19:58:07Z</updated>
<entry>
<title>Correct multiple vulnerabilities in OpenSSH.</title>
<updated>2006-09-30T19:58:07Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-30T19:58:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=8723db212b448269de3734dd4055242155f0129b'/>
<id>urn:sha1:8723db212b448269de3734dd4055242155f0129b</id>
<content type='text'>
Security:	FreeBSD-SA-06:22.openssh
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Correct problem in the 2006-09-28 patch concerning the handling of</title>
<updated>2006-09-29T13:46:41Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-09-29T13:46:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=eae9de64eb36b90772270b9c05d68d06bdb2efbe'/>
<id>urn:sha1:eae9de64eb36b90772270b9c05d68d06bdb2efbe</id>
<content type='text'>
excessively large DH moduli.

Reported by:	Steve Kiernan (Juniper SIRT)
Security:	FreeBSD-SA-06:23.openssl
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Correct multiple vulnerabilities in crypto(3).</title>
<updated>2006-09-28T13:06:23Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-09-28T13:06:23Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=3ad23639492e3bd95d01e73c18a63a6b49153d08'/>
<id>urn:sha1:3ad23639492e3bd95d01e73c18a63a6b49153d08</id>
<content type='text'>
Limit the size of public keys used in order to protect applications
from a denial of service via insane key sizes.

Security:	FreeBSD-SA-06:23.openssl
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Correct multiple vulnerabilities in gzip(1).</title>
<updated>2006-09-19T14:13:53Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-19T14:13:53Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=5bd46f35d7ddbb1d4e1482796a18bd80452ec62f'/>
<id>urn:sha1:5bd46f35d7ddbb1d4e1482796a18bd80452ec62f</id>
<content type='text'>
Security:	FreeBSD-SA-06:21.gzip
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Correct incorrect PKCS#1 v1.5 padding validation in crypto(3). [1]</title>
<updated>2006-09-06T21:23:16Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-06T21:23:16Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=518f8407ec5b300f1aa94ba045e454fb614bcf6f'/>
<id>urn:sha1:518f8407ec5b300f1aa94ba045e454fb614bcf6f</id>
<content type='text'>
Correct multiple denial-of-service vulnerabilities in BIND related to
SIG Query Processing and Excessive Recursive Queries. [2]

Security:	FreeBSD-SA-06:19.openssl [1]
Security:	FreeBSD-SA-06:20.bind [2]
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Correct buffer overflow in the handling of LCP options in ppp(4)</title>
<updated>2006-08-23T22:06:40Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-08-23T22:06:40Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=86fcd2acb8b81dcfce7e0876c0c7e603e1e50886'/>
<id>urn:sha1:86fcd2acb8b81dcfce7e0876c0c7e603e1e50886</id>
<content type='text'>
Security:	FreeBSD-SA-06:18.ppp
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Correct a bug in the handling of multipart messages by sendmail(8)</title>
<updated>2006-06-14T16:01:20Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-06-14T16:01:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=6c2f24c880a628276b5956bb4d118e98799c4904'/>
<id>urn:sha1:6c2f24c880a628276b5956bb4d118e98799c4904</id>
<content type='text'>
which can allow a malformed message to crash a sendmail queue
processing process.

Security:	FreeBSD-SA-06:17.sendmail
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Enable inadvertantly disabled "securenet" access controls in ypserv. [1]</title>
<updated>2006-05-31T22:33:41Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-05-31T22:33:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=9d247711afb50b05397ca68531d19248b446ba46'/>
<id>urn:sha1:9d247711afb50b05397ca68531d19248b446ba46</id>
<content type='text'>
Correct a bug in the handling of backslash characters in smbfs which can
allow an attacker to escape from a chroot(2). [2]

Approved by:	so (cperciva)
Security:	FreeBSD-SA-06:15.ypserv [1]
Security:	FreeBSD-SA-06:16.smbfs [2]
</content>
</entry>
<entry>
<title>MFC: Correct a local information leakage bug affecting AMD FPUs.</title>
<updated>2006-04-19T07:03:14Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-04-19T07:03:14Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=69e48a4731721e86c9bbd2cef46d484ebe906c30'/>
<id>urn:sha1:69e48a4731721e86c9bbd2cef46d484ebe906c30</id>
<content type='text'>
Security:	FreeBSD-SA-06:14.fpu
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Add missing code needed for the detection of IPSec packet replays. [1]</title>
<updated>2006-03-22T16:03:25Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-03-22T16:03:25Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=2c82120cef588b7d97bb551b50df5d287aad93e9'/>
<id>urn:sha1:2c82120cef588b7d97bb551b50df5d287aad93e9</id>
<content type='text'>
Correctly identify the user running opiepasswd(1) when the login name
differs from the account name. [2]

Modify timeout handling logic in sendmail(8) to correct a reported
signal handling race condition. [3]

Approved by:	so (cperciva)
Security:	FreeBSD-SA-06:11.ipsec [1]
Security:	FreeBSD-SA-06:12.opie [2]
Security:	FreeBSD-SA-06:13.sendmail [3]
</content>
</entry>
</feed>
