<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/crypto, branch releng/6.4</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F6.4</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F6.4'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2009-12-03T09:18:40Z</updated>
<entry>
<title>Disable SSL renegotiation in order to protect against a serious</title>
<updated>2009-12-03T09:18:40Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2009-12-03T09:18:40Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=d5c8f6cf7b5e8d1f7734fd0d1f7f64c4362bfde5'/>
<id>urn:sha1:d5c8f6cf7b5e8d1f7734fd0d1f7f64c4362bfde5</id>
<content type='text'>
protocol flaw. [09:15]

Correctly handle failures from unsetenv resulting from a corrupt
environment in rtld-elf. [09:16]

Fix permissions in freebsd-update in order to prevent leakage of
sensitive files. [09:17]

Approved by:	so (cperciva)
Security:	FreeBSD-SA-09:15.ssl
Security:	FreeBSD-SA-09:16.rtld
Security:	FreeBSD-SA-09:17.freebsd-udpate
</content>
</entry>
<entry>
<title>Don't leak information via uninitialized space in db(3) records. [09:07]</title>
<updated>2009-04-22T14:07:14Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2009-04-22T14:07:14Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=3d389dec20be1a2d8523e288debae0cee93201a2'/>
<id>urn:sha1:3d389dec20be1a2d8523e288debae0cee93201a2</id>
<content type='text'>
Sanity-check string lengths in order to stop OpenSSL crashing
when printing corrupt BMPString or UniversalString objects. [09:08]

Security:	FreeBSD-SA-09:07.libc
Security:	FreeBSD-SA-09:08.openssl
Security:	CVE-2009-0590
Approved by:	re (kensmith)
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Prevent cross-site forgery attacks on lukemftpd(8) due to splitting</title>
<updated>2009-01-07T20:17:55Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2009-01-07T20:17:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=c1371bc72e952b0e094cd5dd0dae7ff069f73b07'/>
<id>urn:sha1:c1371bc72e952b0e094cd5dd0dae7ff069f73b07</id>
<content type='text'>
long commands into multiple requests. [09:01]

Fix incorrect OpenSSL checks for malformed signatures due to invalid
check of return value from EVP_VerifyFinal(), DSA_verify, and
DSA_do_verify. [09:02]

Security:	FreeBSD-SA-09:01.lukemftpd
Security:	FreeBSD-SA-09:02.openssl
Obtained from:	NetBSD [SA-09:01]
Obtained from:	OpenSSL Project [SA-09:02]
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Fix logic error in sshd(8) concerning the handling of failed</title>
<updated>2008-04-17T00:00:41Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2008-04-17T00:00:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=677ea35968fe7dab633b6f84dc68e49b9ad19dd4'/>
<id>urn:sha1:677ea35968fe7dab633b6f84dc68e49b9ad19dd4</id>
<content type='text'>
attempts to bind ports for X11 forwarding.

Security:	FreeBSD-SA-08:05.openssh
</content>
</entry>
<entry>
<title>MFC: remove some no-longer-needed _FREEFALL_CONFIG hacks.</title>
<updated>2007-10-29T21:47:56Z</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>2007-10-29T21:47:56Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=60efb6acb2f1a2b477a501f8246632a1920fcf35'/>
<id>urn:sha1:60efb6acb2f1a2b477a501f8246632a1920fcf35</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Correct a buffer overflow in OpenSSL SSL_get_shared_ciphers().</title>
<updated>2007-10-03T21:39:43Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2007-10-03T21:39:43Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=1560e66d537dbe85c3d1f88bfc072a3f79720815'/>
<id>urn:sha1:1560e66d537dbe85c3d1f88bfc072a3f79720815</id>
<content type='text'>
</content>
</entry>
<entry>
<title>InstaMFC: OpenSSH 4.5p1</title>
<updated>2006-11-11T00:51:29Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2006-11-11T00:51:29Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=d354a0a11c558337492aaf0bc29b3b9ad40aab2d'/>
<id>urn:sha1:d354a0a11c558337492aaf0bc29b3b9ad40aab2d</id>
<content type='text'>
Approved by:	re (kensmith)
</content>
</entry>
<entry>
<title>MFC: OpenSSH 4.4p1.</title>
<updated>2006-10-06T14:07:23Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2006-10-06T14:07:23Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=373eb4397043a0e03b2163ce91eb52fa42155e07'/>
<id>urn:sha1:373eb4397043a0e03b2163ce91eb52fa42155e07</id>
<content type='text'>
Approved by:	re (kensmith)
</content>
</entry>
<entry>
<title>This commit was manufactured by cvs2svn to create branch 'RELENG_6'.</title>
<updated>2006-10-01T11:13:01Z</updated>
<author>
<name>cvs2svn</name>
<email>cvs2svn@FreeBSD.org</email>
</author>
<published>2006-10-01T11:13:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=cee30d93ee11b985fcd23feef7348555c592b5ab'/>
<id>urn:sha1:cee30d93ee11b985fcd23feef7348555c592b5ab</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Correct multiple vulnerabilities in OpenSSH.</title>
<updated>2006-09-30T19:50:57Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-30T19:50:57Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=3e6e5c5e407a59ceaf4a1acc24957613d8bf7d46'/>
<id>urn:sha1:3e6e5c5e407a59ceaf4a1acc24957613d8bf7d46</id>
<content type='text'>
Security:	FreeBSD-SA-06:22.openssh
Approved by:	re (kensmith)
</content>
</entry>
</feed>
