<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src, branch releng/6.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F6.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F6.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2007-02-14T22:30:33Z</updated>
<entry>
<title>Correct problems with locking, namei leakage, and symlink</title>
<updated>2007-02-14T22:30:33Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2007-02-14T22:30:33Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7f9161735d514ab289c27c62f4a0358b3862195f'/>
<id>urn:sha1:7f9161735d514ab289c27c62f4a0358b3862195f</id>
<content type='text'>
creation in the NFS subsystem.

Approved by:	so (cperciva)
Submitted by:	re (hrs)
Errata:		FreeBSD-EN-07:01.nfs
</content>
</entry>
<entry>
<title>Fix jail rc.d script privilege escalation via symlink attack against</title>
<updated>2007-01-11T18:19:33Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2007-01-11T18:19:33Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3adbb43be311e66231e4f5d4461a9cf1d88d729b'/>
<id>urn:sha1:3adbb43be311e66231e4f5d4461a9cf1d88d729b</id>
<content type='text'>
/var/log/console.log and mount points.

Security:	FreeBSD-SA-07:01.jail
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Correct a signedness bug which allowed members of the operator</title>
<updated>2006-12-06T09:15:40Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-12-06T09:15:40Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=bd60f04dc1039aa42e27603c869b0248b4848a0b'/>
<id>urn:sha1:bd60f04dc1039aa42e27603c869b0248b4848a0b</id>
<content type='text'>
group to read kernel memory.

Security:	FreeBSD-SA-06:25.kmem
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Correct multiple vulnerabilities in OpenSSH.</title>
<updated>2006-09-30T19:58:07Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-30T19:58:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=cb71836b2a458823180689add0328222c561b199'/>
<id>urn:sha1:cb71836b2a458823180689add0328222c561b199</id>
<content type='text'>
Security:	FreeBSD-SA-06:22.openssh
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Correct problem in the 2006-09-28 patch concerning the handling of</title>
<updated>2006-09-29T13:46:41Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-09-29T13:46:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=12654543b1812c521fd91d9a0aaef4626fb5d75f'/>
<id>urn:sha1:12654543b1812c521fd91d9a0aaef4626fb5d75f</id>
<content type='text'>
excessively large DH moduli.

Reported by:	Steve Kiernan (Juniper SIRT)
Security:	FreeBSD-SA-06:23.openssl
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Correct multiple vulnerabilities in crypto(3).</title>
<updated>2006-09-28T13:06:23Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-09-28T13:06:23Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=952181054e00ea2f528fbebfd76127fc2f5febdd'/>
<id>urn:sha1:952181054e00ea2f528fbebfd76127fc2f5febdd</id>
<content type='text'>
Limit the size of public keys used in order to protect applications
from a denial of service via insane key sizes.

Security:	FreeBSD-SA-06:23.openssl
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Correct multiple vulnerabilities in gzip(1).</title>
<updated>2006-09-19T14:13:53Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-19T14:13:53Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=6de6f7e901429e7d12e74e5818aee4ef2e60a7af'/>
<id>urn:sha1:6de6f7e901429e7d12e74e5818aee4ef2e60a7af</id>
<content type='text'>
Security:	FreeBSD-SA-06:21.gzip
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Correct incorrect PKCS#1 v1.5 padding validation in crypto(3). [1]</title>
<updated>2006-09-06T21:23:16Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2006-09-06T21:23:16Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=9e1260e62009d2823758e93c550ecc7b4335e263'/>
<id>urn:sha1:9e1260e62009d2823758e93c550ecc7b4335e263</id>
<content type='text'>
Correct multiple denial-of-service vulnerabilities in BIND related to
SIG Query Processing and Excessive Recursive Queries. [2]

Security:	FreeBSD-SA-06:19.openssl [1]
Security:	FreeBSD-SA-06:20.bind [2]
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Correct buffer overflow in the handling of LCP options in ppp(4)</title>
<updated>2006-08-23T22:06:40Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-08-23T22:06:40Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=060a6d9a79c3ce28cd4fb6bb84920f91e65f4766'/>
<id>urn:sha1:060a6d9a79c3ce28cd4fb6bb84920f91e65f4766</id>
<content type='text'>
Security:	FreeBSD-SA-06:18.ppp
Approved by:	so (cperciva)
</content>
</entry>
<entry>
<title>Correct a bug in the handling of multipart messages by sendmail(8)</title>
<updated>2006-06-14T16:01:20Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2006-06-14T16:01:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=c7e7298883f7ae899de9e6e2cd5d71790b2eefad'/>
<id>urn:sha1:c7e7298883f7ae899de9e6e2cd5d71790b2eefad</id>
<content type='text'>
which can allow a malformed message to crash a sendmail queue
processing process.

Security:	FreeBSD-SA-06:17.sendmail
Approved by:	so (cperciva)
</content>
</entry>
</feed>
