summaryrefslogtreecommitdiffstats
path: root/UPDATING
Commit message (Expand)AuthorAgeFilesLines
* Fix multiple vulnerabilities of ntp.releng/10.1delphij2016-12-221-0/+4
* Merge r309688: address regressions in SA-16:37.libc.glebius2016-12-071-0/+4
* Fix possible login(1) argument injection in telnetd(8). [SA-16:36]glebius2016-12-061-0/+12
* Fix OpenSSL remote DoS vulnerability. [SA-16:35]delphij2016-11-021-0/+4
* Revised SA-16:15. The initial patch didn't cover all possible overflowsglebius2016-10-251-0/+4
* Fix bspatch heap overflow vulnerability. [SA-16:29]delphij2016-10-101-1/+11
* Apply upstream revision 3612ff6fcec0e3d1f2a598135fe12177c0419582:delphij2016-09-261-0/+4
* Fix multiple OpenSSL vulnerabilitites.delphij2016-09-231-0/+4
* Fix bspatch heap overflow vulnerability. [SA-16:25]delphij2016-07-251-0/+8
* Fix multiple ntp vulnerabilities.delphij2016-06-041-0/+4
* Fix kernel stack disclosure in Linux compatibility layer. [SA-16:20]glebius2016-05-311-0/+8
* - Use unsigned version of min() when handling arguments of SETFKEY ioctl.glebius2016-05-171-0/+7
* Fix multiple OpenSSL vulnerabilitites. [SA-16:17]delphij2016-05-041-1/+8
* Fix ntp multiple vulnerabilities.delphij2016-04-291-0/+4
* o Fix OpenSSH xauth(1) command injection. [SA-16:14]glebius2016-03-161-0/+8
* Fix multiple OpenSSL vulnerabilities.delphij2016-03-031-0/+4
* Fix OpenSSL SSLv2 ciphersuite downgrade vulnerability.delphij2016-01-301-0/+4
* Fix multiple vulnerabilities of ntp. [SA-16:09]delphij2016-01-271-0/+8
* Fix OpenSSH client information leak.glebius2016-01-141-0/+4
* o Fix invalid TCP checksums with pf(4). [EN-16:02.pf]glebius2016-01-141-0/+18
* Fix OpenSSL multiple vulnerabilities.delphij2015-12-051-0/+4
* o Fix regressions related to SA-15:25 upgrade of NTP. [1]glebius2015-11-041-0/+12
* Upgrade NTP to 4.2.8p4.glebius2015-10-261-0/+9
* Fix a regression with SA-15:24 patch that prevented NIS fromdelphij2015-10-021-0/+3
* The Sun RPC framework uses a netbuf structure to represent thedelphij2015-09-291-0/+4
* Implement pubkey support for pkg(7) bootstrap. [EN-15:18]delphij2015-09-161-0/+4
* Fix local privilege escalation in IRET handler. [SA-15:21]delphij2015-08-251-0/+14
* Fix patchlevel in UPDATING.delphij2015-08-181-1/+1
* Fix multiple integer overflows in expat.delphij2015-08-181-0/+5
* Fix patch(1) shell injection vulnerability via ed(1). [SA-15:18]delphij2015-08-051-0/+8
* Fix patch(1) shell injection vulnerability. [SA-15:14]delphij2015-07-281-0/+10
* Fix resource exhaustion due to sessions stuck in LAST_ACK state.delphij2015-07-211-0/+5
* [EN-15:08] Revised: Improvements to sendmail TLS/DH interoperability.delphij2015-06-301-0/+11
* Raise the default for sendmail client connections to 1024-bit DHdelphij2015-06-181-0/+3
* Fix OpenSSL multiple vulnerabilities.delphij2015-06-121-0/+3
* src/UPDATING in releng/10.1 should reflect the right patchlevel.delphij2015-06-101-1/+1
* Update base system file(1) to 5.22 to address multiple denial ofdelphij2015-06-091-0/+9
* Fix bug with freebsd-update(8) that does not ensure the previousdelphij2015-05-131-0/+8
* Improve patch for SA-15:04.igmp to solve a potential buffer overflow.delphij2015-04-071-0/+13
* Fix issues with original SA-15:06.openssl commit:delphij2015-03-201-0/+3
* Fix multiple OpenSSL vulnerabilities.delphij2015-03-191-0/+3
* Fix integer overflow in IGMP protocol. [SA-15:04]delphij2015-02-251-0/+13
* Fix SCTP SCTP_SS_VALUE kernel memory corruption and disclosure vulnerabilitydelphij2015-01-271-0/+8
* Fix multiple vulnerabilities in OpenSSL. [SA-15:01]delphij2015-01-141-0/+3
* [SA-14:31] Fix multiple vulnerabilities in NTP suite.des2014-12-231-0/+6
* Fix unbound remote denial of service vulnerability.delphij2014-12-171-0/+3
* Fix buffer overflow in stdio.delphij2014-12-101-0/+8
* MFC r267176, r267181, r268445 (ATF-related commits):ngie2014-09-091-3/+8
* Add UPDATING entry for r271116emaste2014-09-041-0/+7
* MFC r266650, r267172 (both by jmmv):ngie2014-08-311-0/+16
OpenPOWER on IntegriCloud