<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/contrib, branch stable/6</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=stable%2F6</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=stable%2F6'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2012-01-27T18:21:40Z</updated>
<entry>
<title>MFC r228843:</title>
<updated>2012-01-27T18:21:40Z</updated>
<author>
<name>Ed Maste</name>
<email>emaste@FreeBSD.org</email>
</author>
<published>2012-01-27T18:21:40Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=c2eb82527919aca947c5e12f503c24fd0cf292e5'/>
<id>urn:sha1:c2eb82527919aca947c5e12f503c24fd0cf292e5</id>
<content type='text'>
  Fix a buffer overflow in telnetd. [11:08]
</content>
</entry>
<entry>
<title>Fix an integer overflow in RLE length parsing when decompressing</title>
<updated>2010-09-20T14:58:08Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2010-09-20T14:58:08Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=7139240c074f0e8dbc5baf23fe15f1ecd51b5091'/>
<id>urn:sha1:7139240c074f0e8dbc5baf23fe15f1ecd51b5091</id>
<content type='text'>
corrupt bzip2 data.

Approved by:	so (cperciva)
Security:	FreeBSD-SA-10:08.bzip2
</content>
</entry>
<entry>
<title>Change the current working directory to be inside the jail created by</title>
<updated>2010-05-27T03:15:04Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2010-05-27T03:15:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a63d3059f5e1902fed3a2cc8bc46c82d566ac8f2'/>
<id>urn:sha1:a63d3059f5e1902fed3a2cc8bc46c82d566ac8f2</id>
<content type='text'>
the jail(8) command. [10:04]

Fix a one-NUL-byte buffer overflow in libopie. [10:05]

Correctly sanity-check a buffer length in nfs mount. [10:06]

Approved by:	so (cperciva)
Approved by:	re (kensmith)
Security:	FreeBSD-SA-10:04.jail
Security:	FreeBSD-SA-10:05.opie
Security:	FreeBSD-SA-10:06.nfsclient
</content>
</entry>
<entry>
<title>MFC r205654:</title>
<updated>2010-03-25T20:07:30Z</updated>
<author>
<name>Xin LI</name>
<email>delphij@FreeBSD.org</email>
</author>
<published>2010-03-25T20:07:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=20b236dd6b7deb9121581025e17fb470069db255'/>
<id>urn:sha1:20b236dd6b7deb9121581025e17fb470069db255</id>
<content type='text'>
The rmt client in GNU cpio could have a heap overflow when a malicious
remote tape service returns deliberately crafted packets containing
more data than requested.

Fix this by checking the returned amount of data and bail out when it
is more than what we requested.

PR:		gnu/145010
Submitted by:	naddy
Reviewed by:	imp
Security:	CVE-2010-0624
</content>
</entry>
<entry>
<title>MFC: Update FreeBSD information</title>
<updated>2010-01-31T19:36:59Z</updated>
<author>
<name>Gregory Neil Shapiro</name>
<email>gshapiro@FreeBSD.org</email>
</author>
<published>2010-01-31T19:36:59Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=c7fd99c41e380ef28e7776f8b2faa34c37dea175'/>
<id>urn:sha1:c7fd99c41e380ef28e7776f8b2faa34c37dea175</id>
<content type='text'>
</content>
</entry>
<entry>
<title>MFC: Merge sendmail 8.14.4</title>
<updated>2010-01-31T19:30:47Z</updated>
<author>
<name>Gregory Neil Shapiro</name>
<email>gshapiro@FreeBSD.org</email>
</author>
<published>2010-01-31T19:30:47Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=1bc8ef0a9016cb83600cd25a15506083d439d5cd'/>
<id>urn:sha1:1bc8ef0a9016cb83600cd25a15506083d439d5cd</id>
<content type='text'>
</content>
</entry>
<entry>
<title>MFC: Merge from vendor dist: Bring in a change already in the sendmail</title>
<updated>2010-01-31T19:29:51Z</updated>
<author>
<name>Gregory Neil Shapiro</name>
<email>gshapiro@FreeBSD.org</email>
</author>
<published>2010-01-31T19:29:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=1db0b2ed20801d7e68a583a366b0b01229da75cf'/>
<id>urn:sha1:1db0b2ed20801d7e68a583a366b0b01229da75cf</id>
<content type='text'>
     repository that will allow sendmail to be built with the c99 compiler.
</content>
</entry>
<entry>
<title>Fix BIND named(8) cache poisoning with DNSSEC validation.</title>
<updated>2010-01-06T21:45:30Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2010-01-06T21:45:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a30968d9515f7add6d37283c23a33dc48118d540'/>
<id>urn:sha1:a30968d9515f7add6d37283c23a33dc48118d540</id>
<content type='text'>
[SA-10:01]

Fix ntpd mode 7 denial of service. [SA-10:02]

Fix ZFS ZIL playback with insecure permissions. [SA-10:03]

Various FreeBSD 8.0-RELEASE improvements. [EN-10:01]

Security:	FreeBSD-SA-10:01.bind
Security:	FreeBSD-SA-10:02.ntpd
Security:	FreeBSD-SA-10:03.zfs
Errata:		FreeBSD-EN-10:01.freebsd
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>MFC r200392:</title>
<updated>2009-12-14T01:06:21Z</updated>
<author>
<name>Xin LI</name>
<email>delphij@FreeBSD.org</email>
</author>
<published>2009-12-14T01:06:21Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=c6ed36bc5f0e1cad353107d00e24cc3ebd4b489e'/>
<id>urn:sha1:c6ed36bc5f0e1cad353107d00e24cc3ebd4b489e</id>
<content type='text'>
Apply two vendor fixes for CVE-2009-3720.

Security:	CVE-2009-3720
</content>
</entry>
<entry>
<title>MFC r196916:</title>
<updated>2009-09-10T12:55:09Z</updated>
<author>
<name>Attilio Rao</name>
<email>attilio@FreeBSD.org</email>
</author>
<published>2009-09-10T12:55:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=0600982f5862d771850210b3c4e7cadbb5c8f80c'/>
<id>urn:sha1:0600982f5862d771850210b3c4e7cadbb5c8f80c</id>
<content type='text'>
Fix a list overrun.

Sponsored by: Sandvine Incorporated
</content>
</entry>
</feed>
