<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/contrib, branch releng/6.3</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F6.3</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F6.3'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2010-01-06T21:45:30Z</updated>
<entry>
<title>Fix BIND named(8) cache poisoning with DNSSEC validation.</title>
<updated>2010-01-06T21:45:30Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2010-01-06T21:45:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=1a707c0e67da562b02571106a36b14538caa6783'/>
<id>urn:sha1:1a707c0e67da562b02571106a36b14538caa6783</id>
<content type='text'>
[SA-10:01]

Fix ntpd mode 7 denial of service. [SA-10:02]

Fix ZFS ZIL playback with insecure permissions. [SA-10:03]

Various FreeBSD 8.0-RELEASE improvements. [EN-10:01]

Security:	FreeBSD-SA-10:01.bind
Security:	FreeBSD-SA-10:02.ntpd
Security:	FreeBSD-SA-10:03.zfs
Errata:		FreeBSD-EN-10:01.freebsd
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Fix BIND named(8) dynamic update message remote DoS.</title>
<updated>2009-07-29T00:14:14Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2009-07-29T00:14:14Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=e8c0497d6897110bc83bda93cc1eb51d54d45dc1'/>
<id>urn:sha1:e8c0497d6897110bc83bda93cc1eb51d54d45dc1</id>
<content type='text'>
Obtained from:	ISC
Security:	FreeBSD-SA-09:12.bind
Security:	CVE-2009-0696
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Prevent integer overflow in direct pipe write code from circumventing</title>
<updated>2009-06-10T10:31:11Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2009-06-10T10:31:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=57bbdcd90887aa47cd123bf1200be30ae299356d'/>
<id>urn:sha1:57bbdcd90887aa47cd123bf1200be30ae299356d</id>
<content type='text'>
virtual-to-physical page lookups. [09:09]

Add missing permissions check for SIOCSIFINFO_IN6 ioctl. [09:10]

Fix buffer overflow in "autokey" negotiation in ntpd(8). [09:11]

Approved by:	so (cperciva)
Approved by:	re (not really, but SVN wants this...)
Security:	FreeBSD-SA-09:09.pipe
Security:	FreeBSD-SA-09:10.ipv6
Security:	FreeBSD-SA-09:11.ntpd
</content>
</entry>
<entry>
<title>Correct ntpd(8) cryptographic signature bypass [SA-09:04].</title>
<updated>2009-01-13T21:19:27Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2009-01-13T21:19:27Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a554d42eab4d4e7f72c1718676f2d6183820a607'/>
<id>urn:sha1:a554d42eab4d4e7f72c1718676f2d6183820a607</id>
<content type='text'>
Correct BIND DNSSEC incorrect checks for malformed signatures
[SA-09:04].

Security:	FreeBSD-SA-09:03.ntpd
Security:	FreeBSD-SA-09:04.bind
Obtained from:	ISC [SA-09:04]
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Prevent cross-site forgery attacks on lukemftpd(8) due to splitting</title>
<updated>2009-01-07T20:17:55Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2009-01-07T20:17:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=58c30e69b0f01372bee2b4cdd158d7f0629b23b2'/>
<id>urn:sha1:58c30e69b0f01372bee2b4cdd158d7f0629b23b2</id>
<content type='text'>
long commands into multiple requests. [09:01]

Fix incorrect OpenSSL checks for malformed signatures due to invalid
check of return value from EVP_VerifyFinal(), DSA_verify, and
DSA_do_verify. [09:02]

Security:	FreeBSD-SA-09:01.lukemftpd
Security:	FreeBSD-SA-09:02.openssl
Obtained from:	NetBSD [SA-09:01]
Obtained from:	OpenSSL Project [SA-09:02]
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Improve randomization in BIND to prevent response spoofing.</title>
<updated>2008-07-13T18:42:38Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2008-07-13T18:42:38Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=8c5bc4cffdbd632621dc11ca13d7e83af9349a04'/>
<id>urn:sha1:8c5bc4cffdbd632621dc11ca13d7e83af9349a04</id>
<content type='text'>
Security:	FreeBSD-SA-08:06.bind
Approved by:	so (cperciva)
Thanks to:	remko, csjp
No thanks to:	bronchitis
</content>
</entry>
<entry>
<title>MFC: rev 1.4: forward compatability with cvs-1.12 repository</title>
<updated>2008-01-07T09:08:53Z</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>2008-01-07T09:08:53Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a174ff12b1970a4c6e160dbae933995cfadbe289'/>
<id>urn:sha1:a174ff12b1970a4c6e160dbae933995cfadbe289</id>
<content type='text'>
Approved by: re (kensmith)
</content>
</entry>
<entry>
<title>MFC: less v416.</title>
<updated>2007-12-04T22:41:44Z</updated>
<author>
<name>Xin LI</name>
<email>delphij@FreeBSD.org</email>
</author>
<published>2007-12-04T22:41:44Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=8f9668f0654aced06c17c03efbe97f57b2bf0e12'/>
<id>urn:sha1:8f9668f0654aced06c17c03efbe97f57b2bf0e12</id>
<content type='text'>
Approved by:	re (kensmith)
</content>
</entry>
<entry>
<title>MFC: fix situation where GDB gives incorrect backtraces when a signal</title>
<updated>2007-11-28T16:55:39Z</updated>
<author>
<name>David E. O'Brien</name>
<email>obrien@FreeBSD.org</email>
</author>
<published>2007-11-28T16:55:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a793975d0d6d732d400422ca74dc5c6664fe837d'/>
<id>urn:sha1:a793975d0d6d732d400422ca74dc5c6664fe837d</id>
<content type='text'>
     handler is in the call chain.

Approved by:	re(kensmith)
</content>
</entry>
<entry>
<title>This commit was manufactured by cvs2svn to create branch 'RELENG_6_3'.</title>
<updated>2007-11-24T19:45:58Z</updated>
<author>
<name>cvs2svn</name>
<email>cvs2svn@FreeBSD.org</email>
</author>
<published>2007-11-24T19:45:58Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=0ef2db398f8ee2f0433eb121c3590cb4288b9a04'/>
<id>urn:sha1:0ef2db398f8ee2f0433eb121c3590cb4288b9a04</id>
<content type='text'>
</content>
</entry>
</feed>
