<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/conf, branch releng/7.3</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F7.3</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F7.3'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2012-01-04T23:47:20Z</updated>
<entry>
<title>Extend the character set accepted by freebsd-update(8) in file</title>
<updated>2012-01-04T23:47:20Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2012-01-04T23:47:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=52876b70cd6330061dc60a87e4880f6ee6ab3d43'/>
<id>urn:sha1:52876b70cd6330061dc60a87e4880f6ee6ab3d43</id>
<content type='text'>
names in order to allow upgrades to FreeBSD 9.0-RELEASE.

Approved by:	so (cperciva)
Errata Notice:	FreeBSD-EN-12:01.freebsd-update
</content>
</entry>
<entry>
<title>Fix a problem whereby a corrupt DNS record can cause named to crash. [11:06]</title>
<updated>2011-12-23T15:00:37Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2011-12-23T15:00:37Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d7071cce137418952864dba0c9c57ee4f858a5d0'/>
<id>urn:sha1:d7071cce137418952864dba0c9c57ee4f858a5d0</id>
<content type='text'>
Add an API for alerting internal libc routines to the presence of
"unsafe" paths post-chroot, and use it in ftpd. [11:07]

Fix a buffer overflow in telnetd. [11:08]

Make pam_ssh ignore unpassphrased keys unless the "nullok" option is
specified. [11:09]

Add sanity checking of service names in pam_start. [11:10]

Approved by:    so (cperciva)
Approved by:    re (bz)
Security:       FreeBSD-SA-11:06.bind
Security:       FreeBSD-SA-11:07.chroot
Security:       FreeBSD-SA-11:08.telnetd
Security:       FreeBSD-SA-11:09.pam_ssh
Security:       FreeBSD-SA-11:10.pam
</content>
</entry>
<entry>
<title>Fix a bug in UNIX socket handling in the linux emulator which was</title>
<updated>2011-10-04T19:07:38Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2011-10-04T19:07:38Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=52bc579fa2e5845541940b0b16bf5dab6eff31f5'/>
<id>urn:sha1:52bc579fa2e5845541940b0b16bf5dab6eff31f5</id>
<content type='text'>
exposed by the security fix in FreeBSD-SA-11:05.unix.

Approved by:	so (cperciva)
Approved by:	re (kib)
Security:	Related to FreeBSD-SA-11:05.unix, but not actually
		a security fix.
</content>
</entry>
<entry>
<title>Fix handling of corrupt compress(1)ed data. [11:04]</title>
<updated>2011-09-28T08:47:17Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2011-09-28T08:47:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=e7bf24ad0eb1f7725507c8d2ecf856ca1f4e0239'/>
<id>urn:sha1:e7bf24ad0eb1f7725507c8d2ecf856ca1f4e0239</id>
<content type='text'>
Add missing length checks on unix socket addresses. [11:05]

Approved by:	so (cperciva)
Approved by:	re (kensmith)
Security:	FreeBSD-SA-11:04.compress
Security:	CVE-2011-2895 [11:04]
Security:	FreeBSD-SA-11:05.unix
</content>
</entry>
<entry>
<title>Fix an off by one which can result in a assertion failure in BIND</title>
<updated>2011-05-28T08:44:39Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2011-05-28T08:44:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3d530be3df6cf5e6ebccc6a7aa21c00ff2ec346c'/>
<id>urn:sha1:3d530be3df6cf5e6ebccc6a7aa21c00ff2ec346c</id>
<content type='text'>
related to large RRSIG RRsets and Negative Caching. This can cause
named to crash.

Security:	FreeBSD-SA-11:02.bind
Security:	CVE-2011-1910
Security:	https://www.isc.org/software/bind/advisories/cve-2011-1910
Obtained from:	ISC
Approved by:	so (simon)
</content>
</entry>
<entry>
<title>Fix CIDR parsing bug in mountd ACLs.</title>
<updated>2011-04-20T21:00:24Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2011-04-20T21:00:24Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=c86a3ed6524f8ab6395e55670d5a6e0a86c46b4d'/>
<id>urn:sha1:c86a3ed6524f8ab6395e55670d5a6e0a86c46b4d</id>
<content type='text'>
Approved by:	so (cperciva)
Security:	FreeBSD-SA-11:01.mountd
</content>
</entry>
<entry>
<title>Fix a race condition exists in the OpenSSL TLS server extension code and</title>
<updated>2010-11-29T20:43:06Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2010-11-29T20:43:06Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=cb122a13fc0100962e6408f199a57056593b91f9'/>
<id>urn:sha1:cb122a13fc0100962e6408f199a57056593b91f9</id>
<content type='text'>
a double free in the SSL client ECDH handling code.

Approved by:	so (simon)
Security:	CVE-2010-2939, CVE-2010-3864
Security:	FreeBSD-SA-10:10.openssl
</content>
</entry>
<entry>
<title>Fix an integer overflow in RLE length parsing when decompressing</title>
<updated>2010-09-20T14:58:08Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2010-09-20T14:58:08Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a4c47c73d26c524f3a4a9fdbfc0bd24ed6dbaa18'/>
<id>urn:sha1:a4c47c73d26c524f3a4a9fdbfc0bd24ed6dbaa18</id>
<content type='text'>
corrupt bzip2 data.

Approved by:	so (cperciva)
Security:	FreeBSD-SA-10:08.bzip2
</content>
</entry>
<entry>
<title>Correctly copy the M_RDONLY flag when duplicating a reference</title>
<updated>2010-07-13T02:45:17Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2010-07-13T02:45:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3e4fe68b17667d142097294cc1f00416a4e5ad2e'/>
<id>urn:sha1:3e4fe68b17667d142097294cc1f00416a4e5ad2e</id>
<content type='text'>
to an mbuf external buffer.

Approved by:	so (cperciva)
Approved by:	re (kensmith)
Security:	FreeBSD-SA-10:07.mbuf
</content>
</entry>
<entry>
<title>Change the current working directory to be inside the jail created by</title>
<updated>2010-05-27T03:15:04Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2010-05-27T03:15:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=48a2dfb35961f9d14a3580b0fe97a3eb5dc486c0'/>
<id>urn:sha1:48a2dfb35961f9d14a3580b0fe97a3eb5dc486c0</id>
<content type='text'>
the jail(8) command. [10:04]

Fix a one-NUL-byte buffer overflow in libopie. [10:05]

Correctly sanity-check a buffer length in nfs mount. [10:06]

Approved by:	so (cperciva)
Approved by:	re (kensmith)
Security:	FreeBSD-SA-10:04.jail
Security:	FreeBSD-SA-10:05.opie
Security:	FreeBSD-SA-10:06.nfsclient
</content>
</entry>
</feed>
