FreeBSD is vulnerable to a DoS vulnerability involving high speed pinging with packets over 8184 bytes. Unofficial patch included.
e6d81cdb10724ed192d48717002167649620f7b1c8833755743139dcae8ba13d
Patch for tcp_input.c in FreeBSD in response to stream.c/raped.c.
7d2e64495b07163ff141ebd639ee1e8b8b1f20967e0d3a890b09919bbe58fa35
Patch to sh(1) that adds denying and logging features (user ID, username, process ID, parent process ID, parent process name, login name). Checks against /etc/sh.deny and if the parent/calling program is listed then execution is halted and logged.
e7f2e3bc323b328a675b4a4435ca103b1eb24ea40133b716e01a44446063df6e