Displaying 20 results from an estimated 1000 matches similar to: "freebsd-security Digest, Vol 154, Issue 1"
2006 Mar 30
3
Fundraising for FreeBSD security development
Dear FreeBSD users,
Slightly more than three years ago, I released FreeBSD Update, my first
major contribution to FreeBSD. Since then, I have become a FreeBSD
committer, joined the FreeBSD Security Team, released Portsnap, and
become the FreeBSD Security Officer. However, as I have gone from
being a graduate student at Oxford University -- busy writing my thesis
-- to a researcher at Simon
2006 Apr 23
0
Still Fundraising for FreeBSD security development
Dear FreeBSD users,
On April 4th, I thought that I had reached my donations target for funding
my summer of FreeBSD security development, and asked people to stop sending
further donations. Sadly, it seems that this assessment was premature, as
it relied upon two large pledges, and it now appears that one of them will
not be arriving. Fortunately, Pair Networks -- the other large donor --
has
2004 Oct 26
5
please test: Secure ports tree updating
CVSup is slow, insecure, and a memory hog. However, until now
it's been the only option for keeping an up-to-date ports tree,
and (thanks to all of the recent work on vuxml and portaudit)
it has become quite obvious that keeping an up-to-date ports
tree is very important.
To provide a secure, lightweight, and fast alternative to CVSup,
I've written portsnap. As the name suggests, this
2016 Nov 14
0
FreeBSD Quarterly Status Report - Third Quarter 2016
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
FreeBSD Project Quarterly Status Report - 3rd Quarter 2016
As focused as we are on the present and what is happening now, it is
sometimes useful to take a fresh look at where we have come from, and
where we are going. This quarter, we had our newest doc committer
working to trace through the tangled history of many utilities, and we
2016 Nov 14
0
FreeBSD Quarterly Status Report - Third Quarter 2016
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
FreeBSD Project Quarterly Status Report - 3rd Quarter 2016
As focused as we are on the present and what is happening now, it is
sometimes useful to take a fresh look at where we have come from, and
where we are going. This quarter, we had our newest doc committer
working to trace through the tangled history of many utilities, and we
2006 Apr 05
0
The FreeBSD Foundation Announces Java JDK and JRE 1.5 Binaries for FreeBSD
The FreeBSD Foundation is pleased to announce the availability of the
official Java Runtime Environment (JRE) and Java Development Kit
(JDK) for FreeBSD. The Foundation negotiated a license with Sun
Microsystems to distribute these FreeBSD binaries. The binaries
are based on JDK 1.5 and work with the official FreeBSD 5.4 and
FreeBSD 6.0 releases on the i386 platform.
The FreeBSD Foundation
2005 Mar 04
0
[Fwd: Re: Fwd: FreeBSD hiding security stuff]
The mailing list detained my email because I posted from the wrong
address... hoepfully it will get through this time.
-------- Original Message --------
Subject: Re: Fwd: FreeBSD hiding security stuff
Date: Fri, 04 Mar 2005 05:35:32 -0800
From: Colin Percival <cperciva@freebsd.org>
To: Devon H. O'Dell <dodell@sitetronics.com>
CC: mike@sentex.net, freebsd-security@freebsd.org,
2005 Mar 04
1
[Fwd: Re: FW:FreeBSD hiding security stuff]
Well, I *tried* to CC: freebsd-security... I'm forwarding this to
get around the "posting from wrong address" filter.
-------- Original Message --------
Subject: Re: FW:FreeBSD hiding security stuff
Date: Fri, 04 Mar 2005 04:42:48 -0800
From: Colin Percival <cperciva@freebsd.org>
To: Jonathan Weiss <tomonage2@gmx.de>
CC: freebsd-security@freebsd.org, FreeBSD-Hackers
2005 Oct 31
1
More on freebsd-update (WAS: Is the server portion of freebsd-update open source?)
> Date: Sat, 29 Oct 2005 07:34:28 -0700
> From: Colin Percival <cperciva@freebsd.org>
> Subject: Re: Is the server portion of freebsd-update open source?
> To: markzero <mark@darklogik.org>
> Cc: freebsd-security@freebsd.org
> Message-ID: <43638874.2020004@freebsd.org>
> Content-Type: text/plain; charset=ISO-8859-1
>
> markzero wrote:
> > No this
2006 Apr 24
1
cvs commit: src/sys/amd64/amd64 mp_machdep.c src/sys/i386/i386 mp_machdep.c
Am 24.04.2006 um 23:17 schrieb Colin Percival:
> cperciva 2006-04-24 21:17:02 UTC
>
> FreeBSD src repository
>
> Modified files:
> sys/amd64/amd64 mp_machdep.c
> sys/i386/i386 mp_machdep.c
> Log:
> Adjust dangerous-shared-cache-detection logic from "all shared data
> caches are dangerous" to "a shared L1 data cache is
2005 Aug 18
4
New FreeBSD Security Officer
Hello Everyone!
It has been my pleasure and privilege to serve as the FreeBSD
Security Officer for the past 3+ years. With the crucial support of
the FreeBSD Security Team members, a lot has been accomplished:
hundreds of security issues have been researched and tracked, with
some resulting in security advisories and patches; software in the
Ports Collection are updated more quickly
2009 Dec 01
0
Upcoming FreeBSD Security Advisory
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi all,
A short time ago a "local root" exploit was posted to the full-disclosure
mailing list; as the name suggests, this allows a local user to execute
arbitrary code as root.
Normally it is the policy of the FreeBSD Security Team to not publicly
discuss security issues until an advisory is ready, but in this case
since exploit code is
2008 Jun 03
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated
to reflect recent EoL (end-of-life) events. The new list is below and
at <URL: http://security.freebsd.org/ >. FreeBSD 5.5, FreeBSD 6.1, and
FreeBSD 6.2 have `expired' and are no longer supported effective June 1,
2008. Users of these releases are
2008 Jun 03
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated
to reflect recent EoL (end-of-life) events. The new list is below and
at <URL: http://security.freebsd.org/ >. FreeBSD 5.5, FreeBSD 6.1, and
FreeBSD 6.2 have `expired' and are no longer supported effective June 1,
2008. Users of these releases are
2008 Jun 03
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated
to reflect recent EoL (end-of-life) events. The new list is below and
at <URL: http://security.freebsd.org/ >. FreeBSD 5.5, FreeBSD 6.1, and
FreeBSD 6.2 have `expired' and are no longer supported effective June 1,
2008. Users of these releases are
2007 Feb 01
0
Security Officer-supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been
updated to reflect recent EoL (end-of-life) events. The new list is
below and at <URL: http://security.freebsd.org/ >. FreeBSD 4.11 and
FreeBSD 6.0 have `expired' and are no longer supported effective
February 1, 2007. Discussions concerning FreeBSD releases
2008 Apr 02
1
freebsd-security Digest, Vol 246, Issue 1
Here's another project for us. We'll want to upgrade to 6.3-RELEASE in May.
On Wed, Apr 2, 2008 at 7:00 AM, <freebsd-security-request@freebsd.org> wrote:
> Send freebsd-security mailing list submissions to
> freebsd-security@freebsd.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>
2003 Aug 25
0
FreeBSD Foundation Announces Native Support for Java JDK 1.3.1 on FreeBSD
Boulder, CO - August 25, 2003 - The FreeBSD Foundation today announced the
availability of a binary distribution of the Java JDK version 1.3.1 for
the widely used FreeBSD operating system.
Wes Peters of the FreeBSD Core Team commented "This announcement hallmarks
a new era of Java support for FreeBSD. Having easy to install binary
Java packages will ensure that all users can enjoy the
2006 Oct 10
3
iDefense Security Advisory 10.10.06: FreeBSD ptrace PT_LWPINFO Denial of Service Vulnerability
Bill Moran wrote:
> This report seems pretty vague. I'm unsure as to whether the alleged
> "bug" gives the user any more permissions than he'd already have? Anyone
> know any details?
This is a local denial of service bug, which was fixed 6 weeks ago in HEAD
and RELENG_6. There is no opportunity for either remote denial of service
or any privilege escalation.
>
2004 Mar 05
2
Security Officer-supported branches update
The FreeBSD Security Officer would normally be sending out this email,
but he's a bit busy right now and it is clear from reactions to FreeBSD
Security Advisory FreeBSD-SA-04:04.tcp that many people are unaware of
the current status of the RELENG_5_1 branch, so I'm going to send out
this reminder myself.
The branches supported by the FreeBSD Security Officer have been
updated to reflect