on top of the vendor source.
Another option will be to add an extra command-line flag to 'openssl
version', but this will be rather non-standard and FreeBSD-specific.
More sane option will be to introduce another line into output of
'openssl version -a' and telling people to analyze
o packaudit:
http://codelabs.ru/fbsd/ports/portaudit-db/packaudit-use-subversion.diff
Already posted it to secteam@. Wider testing is welcome!
PS: yes, the patch misses PORTVERSION bump :(
--
Eygene Ryabinkin,,,^..^,,,
[ Life's unfair - but root p
Thu, Dec 03, 2009 at 02:09:36PM +0100, Niels Bakker wrote:
> >=
> >FreeBSD-SA-09:15.sslSecurity Advisory
> > The FreeBSD Proje
Jille, good day.
Tue, Dec 01, 2009 at 05:37:19PM +0100, Jille Timmermans wrote:
> Eygene Ryabinkin schreef:
> > If you're talking about rtld-elf local root, then the real issue
> > is that return values of unsetenv() are not checked and unsetenv()
> > could fail, t
Tue, Dec 01, 2009 at 07:00:16PM +0300, Eygene Ryabinkin wrote:
> Sorry, what do you mean by this? Does the attached script print 'VAR =
> variable' for you as it does for me on 8.0-BETA2 (and undoubtly, on
> 8.0)? If yes then getenv() works properly with a single environment
&
Good evening.
Tue, Dec 01, 2009 at 05:09:57PM +0300, Vasim Valejev wrote:
> I've used that patch to close the hole. This patch is temporary and
> doesn't fix real trouble maker - problem in new version in getenv()
If you're talking about rtld-elf local root, then the real issue
is that return val
Colin, *, good day.
Tue, Dec 01, 2009 at 01:20:45AM +, FreeBSD Security Officer wrote:
> A short time ago a "local root" exploit was posted to the full-disclosure
> mailing list; as the name suggests, this allows a local user to execute
> arbitrary code as root.
>
> [...]
>
> The patch is at
>
Tue, Nov 17, 2009 at 12:47:14PM +0100, Daniel wrote:
> new here so sorry if I am missing any important points. I was
> wondering#: Does anyone know of the status of the "amended" openssl
> packages for FreeBSD. I'd like to try running our site with "reneg
> off", but I can't seem to find any noti
Wed, Nov 11, 2009 at 07:14:48PM +0100, Damian Weber wrote:
> FWIW, I got another result on 6.4-STABLE
>
> FreeBSD mymachine.local 6.4-STABLE FreeBSD 6.4-STABLE #6: Sat Oct 3 13:06:12
> CEST 2009 r...@hypercrypt.local:/usr/obj/usr/src/sys/MYMACHINE i386
>
> $ ./pecoff
> MZaa
>Submitter-Id: current-users
>Originator:Eygene Ryabinkin
>Organization: Code Labs
>Confidential: no
>Synopsis: [patch] OpenSSL in base: fix CVE-2009-3555
>Severity: critical
>Priority: high
>Category: bin
>Class: sw-bug
>Release:
Fri, May 01, 2009 at 10:42:21PM +0400, Eygene Ryabinkin wrote:
> Gentlemen, good day.
>
> Just a reminder about this PR -- it is already a bit old. But it is
> still viable and kicking on many machines of mine. I am seeing speedups
> from 10x to 26x comparing to the plain po
Xin,
Thu, Jul 30, 2009 at 10:43:07PM -0700, Xin LI wrote:
> After talking with Matthew Green (the author of NetBSD) it seems that it
> would be more reasonable to fix the bug itself than breaking upon
> receipt. Here is the patch.
You'll probably want to check that (outsize - suffixes[0].ziplen
Xin, good day.
Thu, Jul 30, 2009 at 04:49:53PM -0700, Xin LI wrote:
> Having checked with GNU's gzip, it looks like that they arbitrarily set
> an upper limit of the suffix length to 30. This is unrelated to the
> memcpy bug but let's address it here as well. My revised patch would
> make the me
Xin, good day.
Wed, Jul 08, 2009 at 05:05:44PM -0700, Xin LI wrote:
> >>> The offending code lays in the function file_compress:
> /* Add (usually) .gz to filename */
> if ((size_t)snprintf(outfile, outsize, "%s%s",
> file, suffixes
Wed, Jul 08, 2009 at 10:33:39PM +0300, rrl wrote:
> I run Freebsd 7.2 and gzip doesn't handle correctly long suffix name
> with the -S option.
> > gzip -S `perl -e 'print "A"x1200'` dummy_file
> Memory fault (core dumped)
>
> The offending code lays in the function file_compress:
> > /
Oliver, good day.
Fri, Jun 05, 2009 at 11:51:27AM +0200, Oliver Pinter wrote:
> thanks for the fast reply, and the patch
No problems. If you'll be messing with either of patches, please,
report on your findings.
Thanks!
--
Eygene
____ _.--. #
\`.|\.....-'` `-._.
Thu, Jun 04, 2009 at 10:15:34PM +0200, Oliver Pinter wrote:
> the base system contins 0.9.8e and this PoC is affected up to 0.9.8i
There was combined PR for the ports/base system OpenSSL,
http://www.freebsd.org/cgi/query-pr.cgi?pr=134653
Probably more complete patch for DTLS stuff,
http://sct
For those who are running Autokey with stock NTPD:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252
http://www.freebsd.org/cgi/query-pr.cgi?pr=134787
For users of net/ntp:
http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/134755
http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/13
Gentlemen, good day.
Just a reminder about this PR -- it is already a bit old. But it is
still viable and kicking on many machines of mine. I am seeing speedups
from 10x to 26x comparing to the plain portaudit. Since VuXML database
will only grow, this will be good to consider these patches and
Mike, *, good day.
Mon, Apr 06, 2009 at 02:44:01PM -0400, Mike Tancsa wrote:
> Just wondering if this impacts FreeBSD's version in any significant way ?
>
> http://www.openssl.org/news/secadv_20090325.txt
DoS is probably the likiest item that will be visible: CMS is disabled
by-default in upstre
Dirk, good day.
Fri, Nov 28, 2008 at 09:12:47AM +0100, [EMAIL PROTECTED] wrote:
> Synopsis: [vuxml] [patch] print/cups-base: fix NULL-pointer dereference
>
> State-Changed-From-To: feedback->closed
> State-Changed-By: dinoex
> State-Changed-When: Fri Nov 28 09:11:46 CET 2008
> State-Changed-Why:
Matthew, good day.
Tue, Nov 25, 2008 at 11:51:42AM +, Matthew Seaman wrote:
> Jason Stone wrote:
>
> > If people really would like to see these kind of notifications (i.e.,
> > security-related PRs for ports) in mailing-list format, I think that a
> > separate mailing list would be appropriat
William, everyone, good day.
Mon, Nov 24, 2008 at 08:05:26PM +0100, William Palfreman wrote:
> 2008/11/24 <[EMAIL PROTECTED]>:
> > Synopsis: [patch] [vuxml] graphics/imlib2: fix CVE-2008-5187
> >
> > State-Changed-From-To: open->closed
> > State-Changed-By: stas
> > State-Changed-When: Mon Nov 24
>Submitter-Id: current-users
>Originator:Eygene Ryabinkin
>Organization: Code Labs
>Confidential: no
>Synopsis: [vuxml] editors/vim: document netrw issues
>Severity: serious
>Priority: medium
>Category: ports
>Class: sw-bug
Anish, good day.
Sun, Nov 23, 2008 at 02:46:26PM -0500, Anish Mistry wrote:
> On Sunday 23 November 2008, Eygene Ryabinkin wrote:
> > >Number: 129097
> > >Category: ports
> > >Synopsis: [vuxml] print/hplip: document CVE-2008-2940 and
> >
Eirik, good day.
Sun, Nov 23, 2008 at 05:03:15PM +0100, Eirik ?verby wrote:
> I have a FreeBSD based firewall (pfsense) and, behind it, a few dozen
> FreeBSD servers. Now we're required to run external security scans
> (nessus++) on some of the hosts, and they constantly come back with a
> "
the kernel.
`-'" `"\_ ,_.-;_.-\_ ', fsc/as #
_.-'_./ {_.' ; / #-- FreeBSD Developers handbook
{_.-``-' {_/ #
From e8f2e991adcde572e1c08951c9b973ca6759455f Mon Sep 17 00:00:00 2001
From: Eygene Ryabinkin <[EMAIL PROTECTE
>Submitter-Id: current-users
>Originator:Eygene Ryabinkin
>Organization: Code Labs
>Confidential: no
>Synopsis: [vuxml] print/hplip: document CVE-2008-2940 and CVE-2008-2941
>Severity: serious
>Priority: high
>Category: ports
>Cla
>Submitter-Id: current-users
>Originator:Eygene Ryabinkin
>Organization: Code Labs
>Confidential: no
>Synopsis: [patch] [vuxml] net/wireshark: fix DoS in SMTP dissector
>Severity: serious
>Priority: high
>Category: ports
>Class: sw-
>Submitter-Id: current-users
>Originator:Eygene Ryabinkin
>Organization: Code Labs
>Confidential: no
>Synopsis: [vuxml] graphics/optipng: document CVE-2008-5101
>Severity: serious
>Priority: high
>Category: ports
>Class: sw-bug
Dirk, good day.
Fri, Nov 21, 2008 at 07:46:12PM +0100, [EMAIL PROTECTED] wrote:
> Synopsis: [vuxml] [patch] print/cups-base: fix NULL-pointer dereference
>
> State-Changed-From-To: open->feedback
> State-Changed-By: dinoex
> State-Changed-When: Fri Nov 21 19:45:23 CET 2008
> State-Changed-Why:
>
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Fri Nov 21 15:20:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE i386
>Organizat
Damien,
Fri, Nov 21, 2008 at 04:13:43PM +0300, Eygene Ryabinkin wrote:
> Fri, Nov 21, 2008 at 10:10:32PM +1100, Damien Miller wrote:
> > see http://www.openssh.com/txt/cbc.adv
>
> Thanks! Is there some secret place that links to this (and other)
> advisory or I sho
Damien, good day.
Fri, Nov 21, 2008 at 10:10:32PM +1100, Damien Miller wrote:
> see http://www.openssh.com/txt/cbc.adv
Thanks! Is there some secret place that links to this (and other)
advisory or I should just poll http://openssh.org/txt/? ;))
--
Eygene
____ _.--. #
\
Me again.
Wed, Nov 19, 2008 at 04:20:58PM +0300, Eygene Ryabinkin wrote:
> Just came across the following list in the oss-security list:
> http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
For you interest, CVE was created and it has some interesting
links inside (SANS one ex
eywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Fri Nov 21 05:50:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE i386
>Organization:
Code Labs
>Env
Me again.
Thu, Nov 20, 2008 at 03:36:00AM +0300, Eygene Ryabinkin wrote:
> It was discovered [1] that CUPS up to 1.3.9 has code path that will
> dereference NULL pointer and it is trivially reproducible when user hits
> the subscription limit, for example via repeated command
Xin,
Wed, Nov 19, 2008 at 03:46:07PM -0800, Xin LI wrote:
> > Thanks for handling this. But I have a question: what is the general
> > policy about versions that are to be documented within the 'range'
> > clauses? You had changed version specification to '1.1.4', but it was
> > never been in th
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Thu Nov 20 00:40:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE i386
>Organization:
Cod
Xin, good day.
Wed, Nov 19, 2008 at 10:37:12PM +, [EMAIL PROTECTED] wrote:
> Synopsis: [vuxml] mail/dovecot: document CVE-2008-4577 and CVE-2008-4578
>
> State-Changed-From-To: open->closed
> State-Changed-By: delphij
> State-Changed-When: Wed Nov 19 22:36:55 UTC 2008
> State-Changed-Why:
>
Wed, Nov 19, 2008 at 11:41:01PM +0300, Eygene Ryabinkin wrote:
> The fix for the CVE-2008-4225 and CVE-2008-4226 was commited to the
> textproc/libxml2 just an hour ago, but vulnerabilities seem to be left
> undocumented. At least I was not able to find the corresponding PR and
&g
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Wed Nov 19 22:00:10 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE i386
>Organization:
Cod
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Wed Nov 19 21:30:14 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE i386
>Organizat
eywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Wed Nov 19 20:50:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE i386
>Organization:
Code Labs
>Env
Wed, Nov 19, 2008 at 04:20:58PM +0300, Eygene Ryabinkin wrote:
> Just came across the following list in the oss-security list:
Err, wanted to say "link" ;))
--
Eygene
____ _.--. #
\`.|\.....-'` `-._.-'_
Good day.
Just came across the following list in the oss-security list:
http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
People are saying that this vulnerability was tested for Debian's ;))
OpenSSH 4.7p1, but they generally believe that any RFC-compliant
implementation should have th
Steven,
Tue, Nov 18, 2008 at 02:50:59PM -0500, Steven M. Christey wrote:
> > So, the VuXML entry should be changed accordingly. New content is
> > attached.
>
> Just for my own understanding, did the erroneous CVE description cause any
> extra work on your part?
No "extra" work. I had just cop
Steven,
Tue, Nov 18, 2008 at 10:01:20AM -0500, Steven M. Christey wrote:
> On Tue, 18 Nov 2008, Eygene Ryabinkin wrote:
> It's pretty clear that the description was a typo. It doesn't follow our
> typical CVE description style of escalating versions when we list version
>
Steven, CVE-supporters, good day.
Today I was submitted FreeBSD's VuXML entry for CVE-2008-3659 and it
seem to be errorneously saying about "PHP 5.6". Could you please try to
follow the discuission and say something about the entry's description
text?
Tue, Nov 18, 2008 at 01:37:13PM +0100, Jille
Jille, good day.
Tue, Nov 18, 2008 at 01:22:09PM +0100, Jille Timmermans wrote:
> I think there is a typo in the vuxml descriptions:
> "PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6"
> (PHP 5.6 doesn't exist (yet))
Yes: it was written in that way at the CVE entry. I had spotted this,
but was
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Tue Nov 18 12:00:09 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE amd64
>Organization:
Code
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Tue Nov 18 11:30:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE amd64
>Organization:
Code
eywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Tue Nov 18 10:40:00 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE amd64
>Organization:
Code Labs
>Envi
Mark, good day.
Fri, Nov 14, 2008 at 08:21:05AM -0800, Mark Foster wrote:
> I have a project idea regarding the extension of portaudit (which now
> solely relies on the vuxml data from security/vuxml) to additionally
> parse OVAL (CVE) data from the SCAP project.
> http://nvd.nist.gov/scap.cfm
> h
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Fri Nov 14 15:00:10 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 8.0-CURRENT amd64
>Organization:
Code Labs
>E
I thought I had added Cc to the freebsd-security, but I hadn't seen
the PR in the list. So I am bouncing this message to the freebsd-security.
Thu, Nov 13, 2008 at 11:00:11AM +, [EMAIL PROTECTED] wrote:
> http://www.freebsd.org/cgi/query-pr.cgi?pr=128837
>
> >Category: ports
> >Respons
t;Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Mon Nov 10 11:20:02 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE i386
>Organization:
Code Labs
>
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Sat Nov 08 14:10:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Eygene Ryabinkin
>Release:FreeBSD 7.1-PRERELEASE amd64
>Organization:
Code Labs
>En
Abiron, good day.
Sat, May 17, 2008 at 05:41:13PM -0700, Abiron Arroyo wrote:
> I'm not really a developer, but was considering if there is a key
> vulnerability in geli given that when you change a key there isn't a disk
> update.
>
> Consider the scenario where a new file system is created and
Good day.
I just read the security alert from the Globus Alliance and want
to pass this information to the FreeBSD security people. Apologies
if the issue is already known and is worked on. Since the information
was already disclosed into the public, I am CC'ing to the
freebsd-security mailing l
Me again.
Sun, Mar 02, 2008 at 08:59:53AM +0300, Eygene Ryabinkin wrote:
> >> Could you please test the following rough patch
> >
> > It seems you are going to cut of part of line silently.
> >
> > IMHO - the line shall be rejected as invalid at all or warning
Me again.
Sun, Mar 02, 2008 at 02:06:34AM +0300, Eygene Ryabinkin wrote:
> Fri, Feb 29, 2008 at 04:39:03PM -, [EMAIL PROTECTED] wrote:
> > I just tested this on FreeBSD 6.3. This bug was discovered on NetBSD. It
> > also works on OpenBSD (unconfirmed on 4.2)
> >
&
Dan, good day.
Sun, Mar 02, 2008 at 01:48:17AM +0100, Dan Lukes wrote:
> Eygene Ryabinkin napsal/wrote, On 03/02/08 00:06:
>>> 1. Run ppp
>>> 2. type the following (or atleat some variation of)
> ...
>
>> Yes, good catch: looks like stack-based buffer overflo
Good day.
[Reposting this message to the freebsd-security from my subscribed address.
Sorry for possible duplicates.]
Fri, Feb 29, 2008 at 04:39:03PM -, [EMAIL PROTECTED] wrote:
> I just tested this on FreeBSD 6.3. This bug was discovered on NetBSD. It also
> works on OpenBSD (unconfirmed on
Good day.
I am posting the follow-up to the -hackers and CC'ing to the
-security, because some more-or-less nasty points were found.
Sat, Feb 23, 2008 at 10:32:02PM +0300, Eygene Ryabinkin wrote:
> But there is another concern with bzero(): it is well-known function.
> Especially fo
Remko, good day.
Fri, Feb 15, 2008 at 11:24:26AM +0100, Remko Lodder wrote:
> I had processed it to VuXML just minutes ago, thanks for your submission!
> (no worries about the stripped attachement!) it's greatly appreciated!
Thank you very much!
--
Eygene
Good day.
Wed, Feb 13, 2008 at 06:38:46PM +0300, Eygene Ryabinkin wrote:
> Attached is the draft of the VuXML entry for the new ClamAV
> vulnerability.
As pointed to me by Remko Lodder, the attachment was stripped.
Resending it inline.
Remko, thanks again for pointing me to this pit
Good day.
Attached is the draft of the VuXML entry for the new ClamAV
vulnerability.
>From what I had seen and from the comments of the iDefence
and ClamAV changelog, it seems that the vulnerable Petite PE
module is really disabled in daily.cfg. The file has entries
'PE:0xbfff:13:23' and 'PE:0xd
Josh, good day.
Tue, Dec 04, 2007 at 10:10:32AM -0600, Josh Paetzel wrote:
> > The usefullness of this with application to the ports collection
> > is questionable, since you should make two colliding archives and
> > both of them should be unpackable and the second should do some
> > evil things.
Matt, good day.
Tue, Dec 04, 2007 at 09:19:58AM -0500, Matt Piechota wrote:
> Norberto Meijome wrote:
>> I understand that the final nail in MD5's coffin hasn't been found
> > yet ( ie, we cannot "determine the exact original input given a
> > hash value") , but the fact that certain magic bytes
Fri, Oct 05, 2007 at 02:10:06PM +0100, Bubble Reading wrote:
> Thanks much for your help.
You're welcome ;))
> I am using FreeBSD v6.2.
>
> My aim is to use a hardware crypto card.
Yes, but for what purpose? To accelerate IPSec or to do some
cryptographic operations? This is somewhat ritorica
Fri, Oct 05, 2007 at 12:26:15PM +0100, Bubble Reading wrote:
> Can I use Fast-IPSec as a tool to run a crypto command ?
If you mean by 'Fast-IPSec' the implementation of the IPSec made
by George Neville-Neil (used to be FAST_IPSEC, but in the 7-CURRENT
old KAME stack was thrown away, so now it is
Good day.
Fri, Oct 05, 2007 at 10:51:56AM +0100, Bubble Reading wrote:
> Does FASTIPSec in FreeBSD use OCF framework ? Where can I find more
> documentation ?
OCF: man 9 crypto
IPSec: man 4 ipsec
It will give you some pointers, at least on the 7-CURRENT.
You can not say 'OCF Framework', because
Fri, Sep 21, 2007 at 11:30:15AM +0200, Mohacsi Janos wrote:
> >Can someone please guide where can I find OCF source code in FreeBSD and
> >also is there IKE implementation and OpenSWAN ?
>
> For IKE have a look at:
> http://www.freshports.org/security/ipsec-tools/
And http://www.freshports.org/se
Dmitry, good day.
Fri, May 18, 2007 at 11:47:53AM +0700, Dmitry A Grigorovich wrote:
> subj
May be you will find an answer in the thread
http://lists.freebsd.org/pipermail/freebsd-ports/2007-May/040668.html
especially read
http://lists.freebsd.org/pipermail/freebsd-ports/2007-May/040672.html
Good day.
Spotted the CVE-2007-1870: the clamav 0.90.2 is already in the ports,
but no sign of the issue in the VuXML. The entry is attached. One
thing that is a bit strange is that the ChangeLog for the ClamAV
(http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog) says about
CVE-2007-1997 as th
G?ran, good day.
Fri, Apr 06, 2007 at 04:50:08PM +0200, G Hasse wrote:
> If an ordinary user runs:
>
> -- snip --
> cat > starv.c < main(){ char *point; while(1) { point = ( char * ) malloc(1); }}
> EOF
> cc starv.c
> while true
> do
> ./a.out &
> done
> -- snip --
>
> This will fast starv
Good day!
Thu, Mar 22, 2007 at 02:04:46PM +0100, Volker wrote:
> > You can use the following rule that will put very fast SSH connectors
> > to the pf table ssh_scans:
> > -
> > pass in quick on $iface proto tcp from any to $ip port 22 flags S/AUSPF \
> > keep state (max-src-conn 4, max-src-
Wed, Mar 21, 2007 at 10:30:06AM -0400, Bill Moran wrote:
> In response to "W. D." <[EMAIL PROTECTED]>:
>
> > At 08:27 3/21/2007, Bill Moran, wrote:
> > I run a little script I wrote that automatically adds
> > >failed SSH attempts to a table that blocks them from _everything_ in my
> > >pf rules.
Colin,
> > I really hope that we're not affected, especially since we didn't get
> > any advance notice of this; but I've asked several of our IPv6 / network
> > stack experts to investigate this.
>
> After hearing from a KAME developers who investigated this issue,
> I'm satisfied that FreeBSD i
Robert, good day.
> Sorry for the delayed response on this -- I've only just returned from Tokyo
> in
> the last day and am significantly behind in e-mail from the trip.
>
> According to a source analysis by Jinmei, we are not vulnerable, but I will
> continue tracking the thread. Apparently
Colin, good day.
> I really hope that we're not affected, especially since we didn't get
> any advance notice of this; but I've asked several of our IPv6 / network
> stack experts to investigate this.
Thank you!
--
Eygene
___
freebsd-security@freebsd.o
Good day.
Just spotted the new advisory from CORE:
http://www.securityfocus.com/archive/1/462728/30/0/threaded
Not an expert, but FreeBSD's src/sys/kern/uipc_mbuf2.c has the very
simular code.
Robert, anyone, could you please check?
Thank you.
--
Eygene
_
Thu, Jan 11, 2007 at 10:56:16AM +0300, Eygene Ryabinkin wrote:
> Remko, good day!
>
> > Thanks for the notification! We are kinda busy at the
> > moment, so if you could spare a minute and write a
> > VuXML entry (a draft would also suffice), we ca
Remko, good day!
> Thanks for the notification! We are kinda busy at the
> moment, so if you could spare a minute and write a
> VuXML entry (a draft would also suffice), we can
> more easily add it. If you are unable to do so, no
> probs, but it is
Colin, good day!
Spotted two patches for x11-servers/xorg-server port: see entries for
x11r6.9.0-dbe-render.diff and x11r6.9.0-cidfonts.diff at
http://xorg.freedesktop.org/releases/X11R6.9.0/patches/index.html
Seems like they are not applied to the xorg-server-6.9.0_5. May be
it should be added to
86 matches
Mail list logo