summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Fix local privilege escalation in IRET handler. [SA-15:21]delphij2015-08-2511-15/+46
* Fix patchlevel in UPDATING.delphij2015-08-181-1/+1
* Fix multiple integer overflows in expat.delphij2015-08-183-3/+27
* Fix patch(1) shell injection vulnerability via ed(1). [SA-15:18]delphij2015-08-055-5/+31
* Correct patchlevel.delphij2015-07-281-1/+1
* Fix patch(1) shell injection vulnerability. [SA-15:14]delphij2015-07-288-101/+135
* Fix resource exhaustion due to sessions stuck in LAST_ACK state.delphij2015-07-213-3/+15
* [EN-15:08] Revised: Improvements to sendmail TLS/DH interoperability.delphij2015-06-306-40/+42
* Raise the default for sendmail client connections to 1024-bit DHdelphij2015-06-183-4/+7
* Fix OpenSSL multiple vulnerabilities.delphij2015-06-1239-361/+619
* src/UPDATING in releng/10.1 should reflect the right patchlevel.delphij2015-06-101-1/+1
* Update base system file(1) to 5.22 to address multiple denial ofdelphij2015-06-0972-1032/+2979
* Fix bug with freebsd-update(8) that does not ensure the previousdelphij2015-05-137-50/+150
* Improve patch for SA-15:04.igmp to solve a potential buffer overflow.delphij2015-04-077-60/+127
* Fix issues with original SA-15:06.openssl commit:delphij2015-03-205-16/+15
* Fix multiple OpenSSL vulnerabilities.delphij2015-03-198-42/+181
* Fix multiple OpenSSL vulnerabilities.delphij2015-03-192-1/+4
* Fix integer overflow in IGMP protocol. [SA-15:04]delphij2015-02-25436-7353/+8746
* Fix SCTP SCTP_SS_VALUE kernel memory corruption and disclosure vulnerabilitydelphij2015-01-274-18/+56
* Fix multiple vulnerabilities in OpenSSL. [SA-15:01]delphij2015-01-1428-612/+409
* [SA-14:31] Fix multiple vulnerabilities in NTP suite.des2014-12-238-11/+46
* Fix unbound remote denial of service vulnerability.delphij2014-12-174-1/+54
* Bump BRANCH (forgotten in r275670)des2014-12-101-1/+1
* Fix buffer overflow in stdio.delphij2014-12-107-30/+128
* Forced commit to sys/conf/newvers.sh to mark the realgjb2014-11-110-0/+0
* Set static abitag to the current value of __FreeBSD_version.gjb2014-11-111-1/+1
* Update releng/10.1 to -RELEASE status, and preparegjb2014-11-111-1/+1
* Document incompatibility between bsdconfig(8) andgjb2014-11-111-0/+50
* Update the Intel ixl/ixlv drivers to fix a panic in the boot/installjfv2014-11-1111-11343/+1293
* MFstable10 273998:jhb2014-11-101-6/+58
* Document SA-14:25, SA-14:26gjb2014-11-061-0/+12
* MFC r274128:wblock2014-11-051-1/+1
* [SA-14:25] Fix kernel stack disclosure in setlogin(2) / getlogin(2).des2014-11-043-30/+39
* MFstable10 r274102:gjb2014-11-041-2/+2
* Update the hardware page to reflect CPU updates/additionsgjb2014-11-032-4/+38
* Update releng/10.1 to -RC4 as part of the 10.1-RELEASE cycle.gjb2014-10-301-1/+1
* MFS10 r273573, MFC r273356:neel2014-10-292-23/+39
* MFS10 r273814smh2014-10-291-0/+6
* MFS10 r273767 / MFC r273638:mav2014-10-282-44/+19
* MFstable10 r273698:gjb2014-10-261-1/+5
* Note to avoid using GENERIC kernel on i386 when usinggjb2014-10-251-0/+43
* Document r273399, OpenSSL updated to version 1.0.1j.gjb2014-10-241-3/+3
* MFS r273580: MFC r273577:delphij2014-10-244-5/+5
* Update releng/10.1 to -RC3 as part of the 10.1-RELEASE cycle.gjb2014-10-211-1/+1
* MFstable10 r273429:gjb2014-10-211-2/+1
* Document the following security advisories:gjb2014-10-211-0/+27
* Fix rtsold(8) remote buffer overflow vulnerability. [SA-14:20]delphij2014-10-213-26/+22
* MFS r273149 (jkim): MFC: r273144, r273146delphij2014-10-21417-1050/+2498
* Add basic UEFI boot procedure manpageemaste2014-10-212-0/+157
* MFstable10 r273354:gjb2014-10-211-6/+11
OpenPOWER on IntegriCloud