From owner-cvs-src@FreeBSD.ORG Wed Jun 29 21:38:48 2005 Return-Path: X-Original-To: cvs-src@FreeBSD.org Delivered-To: cvs-src@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 76F0D16A41C; Wed, 29 Jun 2005 21:38:48 +0000 (GMT) (envelope-from simon@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 638FA43D1F; Wed, 29 Jun 2005 21:38:48 +0000 (GMT) (envelope-from simon@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.1/8.13.1) with ESMTP id j5TLcmfG046390; Wed, 29 Jun 2005 21:38:48 GMT (envelope-from simon@repoman.freebsd.org) Received: (from simon@localhost) by repoman.freebsd.org (8.13.1/8.13.1/Submit) id j5TLcmAu046389; Wed, 29 Jun 2005 21:38:48 GMT (envelope-from simon) Message-Id: <200506292138.j5TLcmAu046389@repoman.freebsd.org> From: "Simon L. Nielsen" Date: Wed, 29 Jun 2005 21:38:48 +0000 (UTC) To: src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: RELENG_5 Cc: Subject: cvs commit: src/contrib/bzip2 bzip2.c bzlib.c compress.c decompress.c huffman.c src/sys/netinet ip_fw2.c tcp_input.c X-BeenThere: cvs-src@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jun 2005 21:38:48 -0000 simon 2005-06-29 21:38:48 UTC FreeBSD src repository (doc,ports committer) Modified files: (Branch: RELENG_5) contrib/bzip2 bzip2.c bzlib.c compress.c decompress.c huffman.c sys/netinet ip_fw2.c tcp_input.c Log: Correct ipfw packet matching errors with address tables. Security: CAN-2005-2019 Security: FreeBSD-SA-05:13.ipfw Correct bzip2 denial of service and permission race vulnerabilities. Obtained from: Redhat, Steve Grubb via RedHat Security: CAN-2005-0953, CAN-2005-1260 Security: FreeBSD-SA-05:14.bzip2 Approved by: obrien Correct TCP connection stall denial of service vulnerability. A TCP packets with the SYN flag set is accepted for established connections, allowing an attacker to overwrite certain TCP options. Security: CAN-2005-2068 Security: FreeBSD-SA-05:15.tcp Approved by: cperciva Revision Changes Path 1.1.1.2.8.1 +34 -9 src/contrib/bzip2/bzip2.c 1.1.1.2.8.1 +37 -14 src/contrib/bzip2/bzlib.c 1.1.1.2.8.1 +7 -5 src/contrib/bzip2/compress.c 1.1.1.2.8.1 +11 -5 src/contrib/bzip2/decompress.c 1.1.1.2.8.1 +18 -1 src/contrib/bzip2/huffman.c 1.70.2.14 +20 -17 src/sys/netinet/ip_fw2.c 1.252.2.20 +1 -1 src/sys/netinet/tcp_input.c