! 001: SECURITY FIX: August 30, 2015All architectures
Inverted logic made PermitRootLogin "prohibit-password" unsafe.
Use "no" (which is the installer default), or apply the following patch.
--- 88,94 ----
! 001: SECURITY FIX: August 30, 2015All architectures
Inverted logic made PermitRootLogin "prohibit-password" unsafe.
Use "no" (which is the installer default), or apply the following patch.
***************
*** 100,106 ****
! 002: INTEROPERABILITY FIX: August 30, 2015All architectures
LibreSSL 2.2.2 incorrectly handles ClientHello messages that do not
include TLS extensions, resulting in such handshakes being aborted.
--- 98,104 ----
! 002: INTEROPERABILITY FIX: August 30, 2015All architectures
LibreSSL 2.2.2 incorrectly handles ClientHello messages that do not
include TLS extensions, resulting in such handshakes being aborted.
***************
*** 110,116 ****
! 003: RELIABILITY FIX: September 28, 2015All architectures
An incorrect operation in uvm could result in system panics.
--- 108,114 ----
! 003: RELIABILITY FIX: September 28, 2015All architectures
An incorrect operation in uvm could result in system panics.
***************
*** 119,125 ****
! 004: SECURITY FIX: October 1, 2015All architectures
Fix multiple reliability and security issues in smtpd:
--- 117,123 ----
! 004: SECURITY FIX: October 1, 2015All architectures
Fix multiple reliability and security issues in smtpd:
***************
*** 138,144 ****
! 005: RELIABILITY FIX: October 14, 2015All architectures
A problem with timer kevents could result in a kernel hang (local denial
of service).
--- 136,142 ----
! 005: RELIABILITY FIX: October 14, 2015All architectures
A problem with timer kevents could result in a kernel hang (local denial
of service).
***************
*** 147,153 ****
! 006: RELEASE CD ISSUE: Oct 18, 2015All architectures
The "src.tar.gz" file on the source tree was created on the wrong day,
and does not match the 5.8 release builds.
--- 145,151 ----
! 006: RELEASE CD ISSUE: Oct 18, 2015All architectures
The "src.tar.gz" file on the source tree was created on the wrong day,
and does not match the 5.8 release builds.
***************
*** 158,164 ****
! 007: RELIABILITY FIX: October 15, 2015All architectures
The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun
and memory leak, as reported by Qualys Security.
--- 156,162 ----
! 007: RELIABILITY FIX: October 15, 2015All architectures
The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun
and memory leak, as reported by Qualys Security.
***************
*** 167,173 ****
! 008: RELIABILITY FIX: November 9, 2015All architectures
Insufficient validation of RSN element group cipher values in 802.11
beacons and probe responses could result in system panics.
--- 165,171 ----
! 008: RELIABILITY FIX: November 9, 2015All architectures
Insufficient validation of RSN element group cipher values in 802.11
beacons and probe responses could result in system panics.
***************
*** 176,182 ****
! 009: RELIABILITY FIX: Dec 3, 2015All architectures
A NULL pointer dereference could be triggered by a crafted certificate sent to
services configured to verify client certificates on TLS/SSL connections.
--- 174,180 ----
! 009: RELIABILITY FIX: Dec 3, 2015All architectures
A NULL pointer dereference could be triggered by a crafted certificate sent to
services configured to verify client certificates on TLS/SSL connections.
***************
*** 185,191 ****
! 010: SECURITY FIX: January 14, 2016All architectures
Experimental roaming code in the ssh client could be tricked by a hostile sshd
server, potentially leaking key material. CVE-2016-0777 and CVE-0216-0778.
--- 183,189 ----
! 010: SECURITY FIX: January 14, 2016All architectures
Experimental roaming code in the ssh client could be tricked by a hostile sshd
server, potentially leaking key material. CVE-2016-0777 and CVE-0216-0778.
***************
*** 198,204 ****
! 012: SECURITY FIX: March 16, 2016All architectures
Insufficient checks in IPv6 socket binding and UDP IPv6 option
processing allow a local user to send UDP packets with a source
--- 209,215 ----
! 012: SECURITY FIX: March 16, 2016All architectures
Insufficient checks in IPv6 socket binding and UDP IPv6 option
processing allow a local user to send UDP packets with a source
***************
*** 222,228 ****
! 013: SECURITY FIX: May 3, 2016All architectures
Fix issues in the libcrypto library.
Refer to the OpenSSL advisory.
--- 220,226 ----
! 013: SECURITY FIX: May 3, 2016All architectures
Fix issues in the libcrypto library.
Refer to the OpenSSL advisory.
***************
*** 239,245 ****
! 014: SECURITY FIX: May 17, 2016All architectures
Insufficient checks in the uvideo(4) V4L2 ioctl handling leak kernel
memory contents to a local user.
--- 237,243 ----
! 014: SECURITY FIX: May 17, 2016All architectures
Insufficient checks in the uvideo(4) V4L2 ioctl handling leak kernel
memory contents to a local user.
***************
*** 249,255 ****
! 015: RELIABILITY FIX: May 29, 2016All architectures
Fix a bug in the libcrypto library when parsing certain ASN.1 elements.
--- 247,253 ----
! 015: RELIABILITY FIX: May 29, 2016All architectures
Fix a bug in the libcrypto library when parsing certain ASN.1 elements.
***************
*** 258,264 ****
! 016: SECURITY FIX: June 2, 2016All architectures
Fix issues in the libexpat library to prevent multiple integer and buffer overflows.
--- 256,262 ----
! 016: SECURITY FIX: June 2, 2016All architectures
Fix issues in the libexpat library to prevent multiple integer and buffer overflows.
***************
*** 267,273 ****
! 017: SECURITY FIX: June 6, 2016All architectures
Correct a problem that prevents the DSA signing algorithm from running
in constant time even if the flag BN_FLG_CONSTTIME is set.
--- 265,271 ----
! 017: SECURITY FIX: June 6, 2016All architectures
Correct a problem that prevents the DSA signing algorithm from running
in constant time even if the flag BN_FLG_CONSTTIME is set.
***************
*** 277,283 ****
! 018: RELIABILITY FIX: July 14, 2016All architectures
Splicing sockets in a loop could cause a kernel spin.
--- 275,281 ----
! 018: RELIABILITY FIX: July 14, 2016All architectures
Splicing sockets in a loop could cause a kernel spin.
***************
*** 286,292 ****
! 019: RELIABILITY FIX: July 14, 2016All architectures
ufs_readdir failed to limit size of memory allocation, leading to panics.
--- 284,290 ----
! 019: RELIABILITY FIX: July 14, 2016All architectures
ufs_readdir failed to limit size of memory allocation, leading to panics.
***************
*** 295,301 ****
! 020: SECURITY FIX: July 14, 2016All architectures
The mmap extension __MAP_NOFAULT could overcommit resources and crash
the system.
--- 293,299 ----
! 020: SECURITY FIX: July 14, 2016All architectures
The mmap extension __MAP_NOFAULT could overcommit resources and crash
the system.
***************
*** 305,311 ****
! 021: RELIABILITY FIX: July 14, 2016All architectures
Tick counting overflows could cause a kernel crash.
--- 303,309 ----
! 021: RELIABILITY FIX: July 14, 2016All architectures
Tick counting overflows could cause a kernel crash.
***************
*** 314,320 ****
! 022: RELIABILITY FIX: July 14, 2016All architectures
Invalid file descriptor use with kevent(2) could lead to a kernel crash.
--- 312,318 ----
! 022: RELIABILITY FIX: July 14, 2016All architectures
Invalid file descriptor use with kevent(2) could lead to a kernel crash.
***************
*** 323,329 ****
! 023: RELIABILITY FIX: July 14, 2016All architectures
Unchecked parameters and integer overflows in the amap allocation routines
could cause malloc(9) to either not allocate enough memory, leading to memory
--- 321,327 ----
! 023: RELIABILITY FIX: July 14, 2016All architectures
Unchecked parameters and integer overflows in the amap allocation routines
could cause malloc(9) to either not allocate enough memory, leading to memory
***************
*** 334,340 ****
! 024: RELIABILITY FIX: July 25, 2016All architectures
When signaling an error to an HTTP relay client, the connection can be
terminated prematurely, leading to a crash.
--- 332,338 ----
! 024: RELIABILITY FIX: July 25, 2016All architectures
When signaling an error to an HTTP relay client, the connection can be
terminated prematurely, leading to a crash.
***************
*** 344,351 ****
!
! 025: RELIABILITY FIX: August 2, 2016All architectures
A missing NULL check in sysctl code results in a crash.
--- 342,348 ----
! 025: RELIABILITY FIX: August 2, 2016All architectures
A missing NULL check in sysctl code results in a crash.
***************
*** 355,362 ****
!
! 026: RELIABILITY FIX: August 2, 2016All architectures
Missing overflow checks in uvm may result in panics.
--- 352,358 ----
! 026: RELIABILITY FIX: August 2, 2016All architectures
Missing overflow checks in uvm may result in panics.
***************
*** 366,373 ****
!
! 027: SECURITY FIX: August 6, 2016All architectures
Don't look in the current working directory for perl modules to load.
--- 362,368 ----
! 027: SECURITY FIX: August 6, 2016All architectures
Don't look in the current working directory for perl modules to load.
***************
*** 379,386 ****
!
! 028: RELIABILITY FIX: August 6, 2016All architectures
Improve relayd's parsing of the Host-header by following RFC 7230
--- 374,380 ----
! 028: RELIABILITY FIX: August 6, 2016All architectures
Improve relayd's parsing of the Host-header by following RFC 7230
***************
*** 393,398 ****