Displaying 20 results from an estimated 500 matches similar to: "Kernel build fails (RELENG_4_5)"
2003 Aug 05
4
FreeBSD Security Advisory FreeBSD-SA-03:08.realpath [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:08.realpath Security Advisory
The FreeBSD Project
Topic: Single byte buffer overflow in realpath(3)
Category: core
Module: libc
Announced:
2003 Aug 05
4
FreeBSD Security Advisory FreeBSD-SA-03:08.realpath [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:08.realpath Security Advisory
The FreeBSD Project
Topic: Single byte buffer overflow in realpath(3)
Category: core
Module: libc
Announced:
2003 Aug 11
1
FreeBSD Security Advisory FreeBSD-SA-03:09.signal
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:09.signal Security Advisory
The FreeBSD Project
Topic: Insufficient range checking of signal numbers
Category: core
Module: sys
Announced:
2003 Sep 16
9
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:12 Security Advisory
FreeBSD, Inc.
Topic: OpenSSH buffer management error
Category: core, ports
Module: openssh, ports_openssh,
2003 Jun 13
2
exact difference between RELENG_4, RELENG_4_5 . . . RELENG_4_8
Read the documentation on the meaning of the various 4.X tags, and am
not sure what is meant by this:
"The release branch for FreeBSD-4.6 and FreeBSD-4.6.2, used only for
security advisories and other seriously critical fixes."
Similar descriptions are used for the other RELENG_4_X tags.
If I specify RELENG_4 will cvsup also include RELENG_4_3 to RELENG_4_8?
Sorry folks - I'm
2003 Oct 03
6
FreeBSD Security Advisory FreeBSD-SA-03:18.openssl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:18.openssl Security Advisory
The FreeBSD Project
Topic: OpenSSL vulnerabilities in ASN.1 parsing
Category: crypto
Module: openssl
Announced:
2003 Sep 17
2
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:12 Security Advisory
FreeBSD, Inc.
Topic: OpenSSH buffer management error
Category: core, ports
Module: openssh, ports_openssh,
2003 Sep 17
2
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:12 Security Advisory
FreeBSD, Inc.
Topic: OpenSSH buffer management error
Category: core, ports
Module: openssh, ports_openssh,
2003 Aug 12
0
FreeBSD Security Advisory FreeBSD-SA-03:09.signal [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:09.signal Security Advisory
The FreeBSD Project
Topic: Insufficient range checking of signal numbers
Category: core
Module: sys
Announced:
2003 Aug 12
0
FreeBSD Security Advisory FreeBSD-SA-03:09.signal [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:09.signal Security Advisory
The FreeBSD Project
Topic: Insufficient range checking of signal numbers
Category: core
Module: sys
Announced:
2003 Aug 11
0
FreeBSD Security Advisory FreeBSD-SA-03:09.signal
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:09.signal Security Advisory
The FreeBSD Project
Topic: Insufficient range checking of signal numbers
Category: core
Module: sys
Announced:
2003 Mar 29
1
Security fix (Fwd: sendmail 8.12.9 available
From bugtraq :-(
>-----BEGIN PGP SIGNED MESSAGE-----
>
>Sendmail, Inc., and the Sendmail Consortium announce the availability
>of sendmail 8.12.9. It contains a fix for a critical security
>problem discovered by Michal Zalewski whom we thank for bringing
>this problem to our attention. Sendmail urges all users to either
>upgrade to sendmail 8.12.9 or apply a patch for
2003 Sep 25
1
FreeBSD Security Advisory FreeBSD-SA-03:14.arp [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:14.arp Security Advisory
The FreeBSD Project
Topic: denial of service due to ARP resource starvation
Category: core
Module: sys
Announced:
2003 Mar 30
3
FreeBSD Security Advisory FreeBSD-SA-03:07.sendmail
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:07.sendmail Security Advisory
The FreeBSD Project
Topic: a second sendmail header parsing buffer overflow
Category: contrib
Module:
2003 Aug 03
12
FreeBSD Security Advisory FreeBSD-SA-03:08.realpath
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:08.realpath Security Advisory
The FreeBSD Project
Topic: Single byte buffer overflow in realpath(3)
Category: core
Module: libc
Announced:
2003 Aug 12
2
4.5 RELENG broken with recent patches
Got a few servers still on 4.5.
/etc/make.conf contains
NOPROFILE= true # Avoid compiling profiled libraries
make buildworld runs fine, but buildkernel gives
cc -c -O -pipe -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual -fformat-extensions -ansi -nostdinc -I- -I. -I/usr/src/sys -I/usr/src/sys/../include
2003 Jun 30
0
sysctl_out_proc() race in stable w/ patch
There is a rather serious race with copyout() and process termination
in -stable. sysctl_kern_proc() loops through the allproc list writing
the results to user memory. If it stalls during the copyout (e.g. the
user memory has to take a vm_fault) and the process is ripped out from
under it it will go looping into never never land.
The solution is very simple, simply
2003 Sep 16
9
OpenSSH heads-up
OK, an official OpenSSH advisory was released, see here:
<URL: http://www.mindrot.org/pipermail/openssh-unix-announce/2003-September/000063.html >
The fix is currently in FreeBSD -CURRENT and -STABLE. It will be
applied to the security branches as well today. Attached are patches:
buffer46.patch -- For FreeBSD 4.6-RELEASE and later
buffer45.patch -- For FreeBSD 4.5-RELEASE and
2002 Apr 22
0
FreeBSD Security Advisory FreeBSD-SA-02:23.stdio
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-02:23.stdio Security Advisory
The FreeBSD Project
Topic: insecure handling of stdio file descriptors
Category: core
Module: kernel
Announced:
2003 Mar 31
8
what was that?
What does mean this bizarre msgid?
maillog:
Mar 31 19:31:15 cu sm-mta[5352]: h2VFVEGS005352: from=<nb@sindbad.ru>,
size=1737, class=0, nrcpts=1,
msgid=<!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAfp4Fa2ShPE2u4pP/QpPDIMKAAAAQAAAAj+zb4Isbuk+tYEPVF9Vf,
proto=ESMTP, daemon=MTA, relay=wg.pu.ru [193.124.85.219]
--
Nikolaj I. Potanin, SA http://www.drweb.ru
ID