<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/crypto, branch release/6.2.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=release%2F6.2.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=release%2F6.2.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2006-11-11T00:51:29Z</updated>
<entry>
<title>InstaMFC: OpenSSH 4.5p1</title>
<updated>2006-11-11T00:51:29Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2006-11-11T00:51:29Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=d354a0a11c558337492aaf0bc29b3b9ad40aab2d'/>
<id>urn:sha1:d354a0a11c558337492aaf0bc29b3b9ad40aab2d</id>
<content type='text'>
Approved by:	re (kensmith)
</content>
</entry>
<entry>
<title>MFC: OpenSSH 4.4p1.</title>
<updated>2006-10-06T14:07:23Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2006-10-06T14:07:23Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=373eb4397043a0e03b2163ce91eb52fa42155e07'/>
<id>urn:sha1:373eb4397043a0e03b2163ce91eb52fa42155e07</id>
<content type='text'>
Approved by:	re (kensmith)
</content>
</entry>
<entry>
<title>This commit was manufactured by cvs2svn to create branch 'RELENG_6'.</title>
<updated>2006-10-01T11:13:01Z</updated>
<author>
<name>cvs2svn</name>
<email>cvs2svn@FreeBSD.org</email>
</author>
<published>2006-10-01T11:13:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=cee30d93ee11b985fcd23feef7348555c592b5ab'/>
<id>urn:sha1:cee30d93ee11b985fcd23feef7348555c592b5ab</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Correct multiple vulnerabilities in OpenSSH.</title>
<updated>2006-09-30T19:50:57Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-30T19:50:57Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=3e6e5c5e407a59ceaf4a1acc24957613d8bf7d46'/>
<id>urn:sha1:3e6e5c5e407a59ceaf4a1acc24957613d8bf7d46</id>
<content type='text'>
Security:	FreeBSD-SA-06:22.openssh
Approved by:	re (kensmith)
</content>
</entry>
<entry>
<title>Correct problem in the 2006-09-28 patch concerning the handling of</title>
<updated>2006-09-29T13:44:03Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-09-29T13:44:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=01b0ed4031a1a2746270718a569139d0aced74de'/>
<id>urn:sha1:01b0ed4031a1a2746270718a569139d0aced74de</id>
<content type='text'>
excessively large DH moduli.

Reported by:	Steve Kiernan (Juniper SIRT)
Security:	FreeBSD-SA-06:23.openssl
Approved by:	re (kensmith)
</content>
</entry>
<entry>
<title>Correct multiple vulnerabilities in crypto(3).</title>
<updated>2006-09-28T13:02:36Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-09-28T13:02:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=68243cc7d13a958d59b5dfb4eaa677ac3d953c5e'/>
<id>urn:sha1:68243cc7d13a958d59b5dfb4eaa677ac3d953c5e</id>
<content type='text'>
Limit the size of public keys used in order to protect applications
from a denial of service via insane key sizes.

Security:	FreeBSD-SA-06:23.openssl
Approved by:	re (htimsnek)
</content>
</entry>
<entry>
<title>MFC: vendor patch for BSM problem in protocol version 1.</title>
<updated>2006-09-25T09:37:35Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2006-09-25T09:37:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=f2c8918211a922f884848646ae088f8b3654b738'/>
<id>urn:sha1:f2c8918211a922f884848646ae088f8b3654b738</id>
<content type='text'>
Approved by:	re (mux)
</content>
</entry>
<entry>
<title>Correct incorrect PKCS#1 v1.5 padding validation in crypto(3). [1]</title>
<updated>2006-09-06T21:20:54Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-06T21:20:54Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=98b50d797300ec54b29cbac0bad3791761af0b71'/>
<id>urn:sha1:98b50d797300ec54b29cbac0bad3791761af0b71</id>
<content type='text'>
Correct multiple denial-of-service vulnerabilities in BIND related to
SIG Query Processing and Excessive Recursive Queries. [2]

Security:	FreeBSD-SA-06:19.openssl [1]
Security:	FreeBSD-SA-06:20.bind [2]
</content>
</entry>
<entry>
<title>Fix a bug in the padlock engine when handling small data blocks.  This</title>
<updated>2006-07-30T14:03:03Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-07-30T14:03:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=8106d843a45786d24e6f1f4aacbf2abbbca05a70'/>
<id>urn:sha1:8106d843a45786d24e6f1f4aacbf2abbbca05a70</id>
<content type='text'>
could cause problem e.g. when using OpenVPN.

This is a direct commit to RELENG_6 since the issue was fixed by the
OpenSSL 0.9.8b import in -CURRENT.

PR:		bin/86598
Submitted by:	Mike Tancsa &lt;mike@sentex.net&gt;
Tested by:	Mike Tancsa, pjd
Obtained from:	OpenSSL CVS (eng_padlock.c 1.12 -&gt; 1.13 diff)
</content>
</entry>
<entry>
<title>MFC: (1.16) our glob(3) has all the required features.</title>
<updated>2006-07-08T15:43:26Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2006-07-08T15:43:26Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=b8503e361ffaf9862912a94e1955561f6e13efca'/>
<id>urn:sha1:b8503e361ffaf9862912a94e1955561f6e13efca</id>
<content type='text'>
</content>
</entry>
</feed>
