<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src, branch releng/7.4</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F7.4</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F7.4'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2013-02-19T13:27:20Z</updated>
<entry>
<title>Fix Denial of Service vulnerability in named(8) with DNS64. [13:01]</title>
<updated>2013-02-19T13:27:20Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2013-02-19T13:27:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=1c7fe7463d0204f08806b9da6d5d50fb7f75c5ad'/>
<id>urn:sha1:1c7fe7463d0204f08806b9da6d5d50fb7f75c5ad</id>
<content type='text'>
Fix Denial of Service vulnerability in libc's glob(3) functionality.
[13:02]

Security:	CVE-2012-5688
Security:	FreeBSD-SA-13:01.bind
Security:	CVE-2010-2632
Security:	FreeBSD-SA-13:02.libc
Approved by:	so (simon, bz)
</content>
</entry>
<entry>
<title>Fix multiple Denial of Service vulnerabilities with named(8).</title>
<updated>2012-11-22T22:52:15Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2012-11-22T22:52:15Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=97a8436b12801792594457d69cbb5a6e131755d9'/>
<id>urn:sha1:97a8436b12801792594457d69cbb5a6e131755d9</id>
<content type='text'>
Fix insufficient message length validation for EAP-TLS messages.

Fix Linux compatibility layer input validation error.

Security:	FreeBSD-SA-12:06.bind
Security:	FreeBSD-SA-12:07.hostapd
Security:	FreeBSD-SA-12:08.linux
Security:	CVE-2012-4244, CVE-2012-5166, CVE-2012-4445, CVE-2012-4576
Approved by:	re
Approved by:	security-officer
</content>
</entry>
<entry>
<title>Fix named(8) DNSSEC validation Denial of Service.</title>
<updated>2012-08-06T21:33:11Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2012-08-06T21:33:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=12a852643998f690b2610d9e0c78d562a1f0a5b8'/>
<id>urn:sha1:12a852643998f690b2610d9e0c78d562a1f0a5b8</id>
<content type='text'>
Security:	FreeBSD-SA-12:05.bind
Security:	CVE-2012-3817
Obtained from:	ISC
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Fix a problem where zero-length RDATA fields can cause named(8) to crash.</title>
<updated>2012-06-12T12:10:10Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2012-06-12T12:10:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=91843b976ed9c9cea085e348edfb4c94d842f45e'/>
<id>urn:sha1:91843b976ed9c9cea085e348edfb4c94d842f45e</id>
<content type='text'>
[12:03]

Correct a privilege escalation when returning from kernel if
running FreeBSD/amd64 on non-AMD processors. [12:04]

Fix reference count errors in IPv6 code. [EN-12:02]

Security:	CVE-2012-1667
Security:	FreeBSD-SA-12:03.bind
Security:	CVE-2012-0217
Security:	FreeBSD-SA-12:04.sysret
Security:	FreeBSD-EN-12:02.ipv6refcount
Approved by:	so (simon, bz)
</content>
</entry>
<entry>
<title>Update the previous openssl fix. [12:01]</title>
<updated>2012-05-30T12:01:28Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2012-05-30T12:01:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=84504887fad2b1edb392c2ff2dcaa5bd23ab20ea'/>
<id>urn:sha1:84504887fad2b1edb392c2ff2dcaa5bd23ab20ea</id>
<content type='text'>
Fix a bug in crypt(3) ignoring characters of a passphrase. [12:02]

Security:	FreeBSD-SA-12:01.openssl (revised)
Security:	FreeBSD-SA-12:02.crypt
Approved by:	so (bz, simon)
</content>
</entry>
<entry>
<title>Fix multiple OpenSSL vulnerabilities.</title>
<updated>2012-05-03T15:25:11Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2012-05-03T15:25:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8b21581b6026fab3c4dc9312e0788064f9fb510c'/>
<id>urn:sha1:8b21581b6026fab3c4dc9312e0788064f9fb510c</id>
<content type='text'>
Security:	CVE-2011-4576, CVE-2011-4619, CVE-2011-4109
Security:	CVE-2012-0884, CVE-2012-2110
Security:	FreeBSD-SA-12:01.openssl
Approved by:	so (bz,simon)
</content>
</entry>
<entry>
<title>Extend the character set accepted by freebsd-update(8) in file</title>
<updated>2012-01-04T23:47:20Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2012-01-04T23:47:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a1e8e5c787547fcce016300478b009c4502dd602'/>
<id>urn:sha1:a1e8e5c787547fcce016300478b009c4502dd602</id>
<content type='text'>
names in order to allow upgrades to FreeBSD 9.0-RELEASE.

Approved by:	so (cperciva)
Errata Notice:	FreeBSD-EN-12:01.freebsd-update
</content>
</entry>
<entry>
<title>Fix a problem whereby a corrupt DNS record can cause named to crash. [11:06]</title>
<updated>2011-12-23T15:00:37Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2011-12-23T15:00:37Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=60183881171350323c0540e0a78442f67fbb8797'/>
<id>urn:sha1:60183881171350323c0540e0a78442f67fbb8797</id>
<content type='text'>
Add an API for alerting internal libc routines to the presence of
"unsafe" paths post-chroot, and use it in ftpd. [11:07]

Fix a buffer overflow in telnetd. [11:08]

Make pam_ssh ignore unpassphrased keys unless the "nullok" option is
specified. [11:09]

Add sanity checking of service names in pam_start. [11:10]

Approved by:    so (cperciva)
Approved by:    re (bz)
Security:       FreeBSD-SA-11:06.bind
Security:       FreeBSD-SA-11:07.chroot
Security:       FreeBSD-SA-11:08.telnetd
Security:       FreeBSD-SA-11:09.pam_ssh
Security:       FreeBSD-SA-11:10.pam
</content>
</entry>
<entry>
<title>Fix a bug in UNIX socket handling in the linux emulator which was</title>
<updated>2011-10-04T19:07:38Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2011-10-04T19:07:38Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=59e424cac7f8b17e5af21681075344f5cfcdb78a'/>
<id>urn:sha1:59e424cac7f8b17e5af21681075344f5cfcdb78a</id>
<content type='text'>
exposed by the security fix in FreeBSD-SA-11:05.unix.

Approved by:	so (cperciva)
Approved by:	re (kib)
Security:	Related to FreeBSD-SA-11:05.unix, but not actually
		a security fix.
</content>
</entry>
<entry>
<title>Fix handling of corrupt compress(1)ed data. [11:04]</title>
<updated>2011-09-28T08:47:17Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2011-09-28T08:47:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=261d4022db3351b55685fed4b18a98ed32aa203f'/>
<id>urn:sha1:261d4022db3351b55685fed4b18a98ed32aa203f</id>
<content type='text'>
Add missing length checks on unix socket addresses. [11:05]

Approved by:	so (cperciva)
Approved by:	re (kensmith)
Security:	FreeBSD-SA-11:04.compress
Security:	CVE-2011-2895 [11:04]
Security:	FreeBSD-SA-11:05.unix
</content>
</entry>
</feed>
