Commit Graph

165469 Commits

Author SHA1 Message Date
Xin LI
0d9d75b124 Fix OpenSSL multiple vulnerabilities. [13:03]
Fix BIND remote denial of service. [13:04]

Security:	CVE-2013-0166, CVE-2013-0169
Security:	FreeBSD-SA-13:03.openssl
Security:	CVE-2013-2266
Security:	FreeBSD-SA-13:04.bind
Approved by:	so
2013-04-02 17:34:42 +00:00
Bjoern A. Zeeb
660eb4006e Fix Denial of Service vulnerability in named(8) with DNS64. [13:01]
Fix Denial of Service vulnerability in libc's glob(3) functionality.
[13:02]

Security:	CVE-2012-5688
Security:	FreeBSD-SA-13:01.bind
Security:	CVE-2010-2632
Security:	FreeBSD-SA-13:02.libc
Approved by:	so (simon, bz)
2013-02-19 13:27:20 +00:00
Simon L. B. Nielsen
671eb07ab6 Fix multiple Denial of Service vulnerabilities with named(8).
Fix insufficient message length validation for EAP-TLS messages.

Fix Linux compatibility layer input validation error.

Security:	FreeBSD-SA-12:06.bind
Security:	FreeBSD-SA-12:07.hostapd
Security:	FreeBSD-SA-12:08.linux
Security:	CVE-2012-4244, CVE-2012-5166, CVE-2012-4445, CVE-2012-4576
Approved by:	re
Approved by:	security-officer
2012-11-22 22:52:15 +00:00
Simon L. B. Nielsen
9e80c86470 Fix named(8) DNSSEC validation Denial of Service.
Security:	FreeBSD-SA-12:05.bind
Security:	CVE-2012-3817
Obtained from:	ISC
Approved by:	so (simon)
2012-08-06 21:33:11 +00:00
Bjoern A. Zeeb
7de97b74b6 Fix a problem where zero-length RDATA fields can cause named(8) to crash.
[12:03]

Correct a privilege escalation when returning from kernel if
running FreeBSD/amd64 on non-AMD processors. [12:04]

Fix reference count errors in IPv6 code. [EN-12:02]

Security:	CVE-2012-1667
Security:	FreeBSD-SA-12:03.bind
Security:	CVE-2012-0217
Security:	FreeBSD-SA-12:04.sysret
Security:	FreeBSD-EN-12:02.ipv6refcount
Approved by:	so (simon, bz)
2012-06-12 12:10:10 +00:00
Bjoern A. Zeeb
f9ac304cf1 Update the previous openssl fix. [12:01]
Fix a bug in crypt(3) ignoring characters of a passphrase. [12:02]

Security:	FreeBSD-SA-12:01.openssl (revised)
Security:	FreeBSD-SA-12:02.crypt
Approved by:	so (bz, simon)
2012-05-30 12:01:28 +00:00
Bjoern A. Zeeb
09a865e4fb Fix multiple OpenSSL vulnerabilities.
Security:	CVE-2011-4576, CVE-2011-4619, CVE-2011-4109
Security:	CVE-2012-0884, CVE-2012-2110
Security:	FreeBSD-SA-12:01.openssl
Approved by:	so (bz,simon)
2012-05-03 15:25:11 +00:00
Ken Smith
b86837bec5 MFC r229304:
> The portion of r225757 that added the packages-9.0-release directory
> was supposed to be MFCed closer to the release but that got missed.
>
> Pointy hat:   kensmith

Approved by:	re (implicit)
2012-01-02 18:50:17 +00:00
Ken Smith
abfc830c41 Ready to start the 9.0-RELEASE builds.
Approved by:	re (implicit)
2012-01-02 14:45:30 +00:00
Ken Smith
a34a98ed2a Guess when we'll be ready to announce 9.0-RELEASE.
Approved by:	re (implicit)
2012-01-02 14:44:28 +00:00
Ken Smith
405e672e5e Update branch target for 'make update'.
Approved by:	re (implicit)
2012-01-02 04:16:45 +00:00
Ken Smith
91654c7cfe MFC r229258:
RELENG_9 exists now so updated commented out target branch.

Approved by:	re (implicit)
2012-01-02 04:11:22 +00:00
Bjoern A. Zeeb
6c94c76fc7 MFC r229067 (by obrien):
Happy 2012 and may 9.0-RELEASE be a good one.

Approved by:	re (kib)
2011-12-31 13:44:10 +00:00
Hiroki Sato
b0a629c087 Clean up release/doc for 9.0R. Content updates will follow in
stable/9.

Approved by:	re (kensmith)
2011-12-30 22:50:16 +00:00
Colin Percival
7501ca4395 Fix a problem whereby a corrupt DNS record can cause named to crash. [11:06]
Add an API for alerting internal libc routines to the presence of
"unsafe" paths post-chroot, and use it in ftpd. [11:07]

Fix a buffer overflow in telnetd. [11:08]

Make pam_ssh ignore unpassphrased keys unless the "nullok" option is
specified. [11:09]

Add sanity checking of service names in pam_start. [11:10]

Approved by:    so (cperciva)
Approved by:    re (bz)
Security:       FreeBSD-SA-11:06.bind
Security:       FreeBSD-SA-11:07.chroot
Security:       FreeBSD-SA-11:08.telnetd
Security:       FreeBSD-SA-11:09.pam_ssh
Security:       FreeBSD-SA-11:10.pam
2011-12-23 15:00:37 +00:00
Gleb Smirnoff
2f0f961244 Merge r228472. For the sake of POLA for the whole 9.x timeline add
compatibility support for specifing IPv4 aliases in rc.conf without
the "inet" keyword.

Approved by:	re (bz)
2011-12-19 13:14:57 +00:00
Ruslan Ermilov
ac5e1c9de9 MFC r228457:
The "inet" keyword in the "ifconfig_IF_aliasN" is mandatory for
IPv4 aliases to work since network.subr@197139.

Approved by:  re (bz)
2011-12-19 12:51:12 +00:00
Dag-Erling Smørgrav
6c13b056bb MFH r228384: validate the service name
Approved by:	re (kib)
Security:	some poorly thought out programs allow the user to specify
		the service name; this patch makes it harder to trick these
		programs into loading and executing arbitrary code.
2011-12-13 13:02:31 +00:00
Dag-Erling Smørgrav
691c2aa20a MFH r228410: check for null passphrases, since openssl doesn't
Approved by:	re (kib)
Security:	prevents users with unencrypted ssh keys (prohibited
		unless the nullok option is specified) from logging in
		by providing a bogus non-null passphrase.
2011-12-11 17:32:37 +00:00
Hiroki Sato
ed097b5374 MFC r226649, 226651, 226652, 226653:
- Fix an issue that 127/8 is not configured when $ifconfig_DEFAULT is not empty.
- Add description that IPv6 configuration will be ignored if $ifconfig_IF_ipv6
  is empty.
- Move a configuration example "inet6 accept_rtadv" to just after the manual
  GUA configuration.
- Add an example of $ipv6_prefix_IF.
- Add support for removing addresses added by ipv6_prefix_hostid_addr_up()
  upon rc.d/netif stop.

Approved by:	re (bz)
2011-12-03 22:16:36 +00:00
Hiroki Sato
6143f08611 MFC r226446:
Fix a problem that an interface unexpectedly becomes IFF_UP by
just doing "ifconfing inet6 -ifdisabled" when the interface has
ND6_IFF_AUTO_LINKLOCAL flag and no link-local address.

Approved by:	re (bz)
2011-12-03 22:15:42 +00:00
Nathan Whitehorn
14913feeda MFC r228194, MF9 r228240:
Prevent user astonishment by providing the shell option at the end, after
any installer-provided configuration files have been copied. This allows
users to edit their fstab, if desired, and to see what the installer has
placed in rc.conf.

Requested by:	phk
Approved by:	re (kensmith)
2011-12-03 17:17:32 +00:00
Ken Smith
59b4938e9c Ready for 9.0-RC3.
Approved by:	re (implicit)
2011-12-03 17:03:48 +00:00
Ken Smith
186954cffc MFC r228237:
> Add a screen that asks if the user would like to enable crash dumps,
> giving them a very brief description of the trade-offs.  Whether the
> user opts in or out add an entry to what will become /etc/rc.conf
> explaining what dumpdev is and how to turn on/off crash dumps.  The folks
> who handle interacting with users submitting PRs have asked for this.
>
> Reviewed by:  nwhitehorn

Approved by:	re (kib)
2011-12-03 17:02:51 +00:00
Doug Barton
9297f1719b Upgrade to BIND 9.8.1-P1 to address the following DDOS bug:
Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-4313
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313

Approved by:	re (kib)
2011-12-01 21:17:59 +00:00
John Baldwin
5d0fc87b62 MFC 227389: Remove some debugging printfs.
Approved by:	re (bz)
2011-12-01 20:39:18 +00:00
Gleb Smirnoff
88e8ae2eb3 MFhead r228150:
Return value should be conditional on return value of pfsync_defer_ptr()

  PR:		kern/162947
  Submitted by:	Matthieu Kraus <matthieu.kraus s2008.tu-chemnitz.de>

Approved by:	re (kib)
2011-12-01 15:20:36 +00:00
Gabor Kovesdan
89476f2533 MFC 228093
- Fix behavior of --null to match GNU grep

MFC 228097

  - Call warnx() instead of errx() if a directory is not readable when using
    a recursive search.  This is the expected behavior instead of aborting.

Approved by:	re (kib)
2011-12-01 13:53:33 +00:00
Doug Barton
57f7bffb40 MFC r228122:
If using DESTDIR we need to be sure to create a
${DESTDIR}/var/db/zoneinfo

Approved by:	re (kensmith)
2011-12-01 05:52:50 +00:00
Doug Barton
e6e12a8ca9 MFC r227482:
The default setting, daily_accounting_compress="NO", was causing
only 1 old file to be saved, so fix this.

While I'm here, fix a very old off-by-one error causing 1 more
file than specified in daily_accounting_save to be saved because
acct.0 was not taken into account (pun intended). Change that, and
use a more thorough method of finding old files to delete. Partly
just because this is the right thing to do, but also to silently
fix the extra log that would have been left behind forever with the
previous method.

Approved by:	re (kensmith)
2011-12-01 05:47:51 +00:00
Sergey Kandaurov
dbda2ab542 Adjust branch tag.
This is a direct commit.

Approved by:	re (kib)
2011-11-29 18:23:08 +00:00
Marius Strobl
d42dc02b8c MFC: r228028
- Based on a report on sparc64@ move V245 to the list of known working
  machines.
- Mention that V480 with broken centerplanes have a chance of working with
  the WAR in the upcoming 8.3-RELEASE and 9.0-RELEASE.

Approved by:	re (kib)
2011-11-29 14:18:19 +00:00
Sergey Kandaurov
6a4b45793e MFC r225757,r225764:
Update the default cvs tag for RELENG_9 by merging the following revisions:

r225757 (by kensmith, partial):
 Shift head from 9.0-CURRENT to 10.0-CURRENT in preparation for releasing
 it from the 9.0-RELEASE release cycle code freeze.

r225764 (by kensmith):
 Forgot to add "RELENG_8" to list of CVS tags.

Reported by:	Milan Obuch <freebsd-current at dino sk> (cvs tag)
Approved by:	re (kib)
2011-11-29 12:41:44 +00:00
Christian Brueffer
d76f9dd10f MFC: r227666
Add sfxge(4) to the hardware notes.

Approved by:    re (bz)
2011-11-29 11:25:00 +00:00
Marius Strobl
0bff035e1b MFC: r227960
Increase the CDMA sync timeout for Schizo bridges to 15 seconds as used by
OpenSolaris. One second turned out to be not enough for certain loads while
10 seconds were sufficient.
Reported by: Peter Jeremy

Approved by:	re (bz)
2011-11-29 09:59:55 +00:00
Robert Watson
32c81f7144 Merge r228057 from head to releng/9.0:
Change the Makefile in cddl/lib/drti to use bsd.lib.mk instead of
  bsd.prog.mk -- we need to compile PIC, which requires a library build.
  With this change, USDT (userspace DTrace probes) work from within
  shared libraries.

  PR:             kern/159046
  Submitted by:   Alex Samorukov <samm at os2.kiev.ua>
  Comments by:    Scott Lystig Fritchie <slfritchie at snookles.com>

Approved by:	re (bz)
2011-11-28 22:30:19 +00:00
Robert Watson
929658b1fb Merge r228040 from head to releng/9.0:
Cross-reference capsicum.4 from cap_enter.2 and cap_new.2.

  Sponsored by:   Google, Inc.

Approved by:	re (kib)
2011-11-28 22:24:22 +00:00
Robert Watson
3844d01f6b Merge r228039 from head to releng/9.0:
Add an introductory Capsicum man page providing a high-level description of
  its mechanisms, pointing at other pertinent man pages, and cautioning about
  the experimental status of Capsicum in FreeBSD.

  Sponsored by:   Google, Inc.

Approved by:	re (kib)
2011-11-28 22:13:11 +00:00
Philip Paeps
cd78e102ef Add the sfxge(4) device driver, providing support for 10Gb Ethernet adapters
based on Solarflare SFC9000 family controllers.  The driver supports jumbo
frames, transmit/receive checksum offload, TCP Segmentation Offload (TSO),
Large Receive Offload (LRO), VLAN checksum offload, VLAN TSO, and Receive Side
Scaling (RSS) using MSI-X interrupts.

This work was sponsored by Solarflare Communications, Inc.

My sincere thanks to Ben Hutchings for doing a lot of the hard work!

Sponsored by:	Solarflare Communications, Inc.
Approved by:	re (bz)
2011-11-28 20:43:50 +00:00
Lawrence Stewart
ce4d7ccd9b Fast track MFC r228016:
Plug a TCP reassembly UMA zone leak introduced in r226228 by only using the
backup stack queue entry when the zone is exhausted, otherwise we leak a zone
allocation each time we plug a hole in the reassembly queue.

Reported by:	many on freebsd-stable@ (thread: "TCP Reassembly Issues")
Tested by:	many on freebsd-stable@ (thread: "TCP Reassembly Issues")
Reviewed by:	bz (very brief sanity check)
Approved by:	re (kib)
2011-11-28 11:14:32 +00:00
Gleb Smirnoff
9fcfb7b670 MFhead r227901:
Fix parsing of redirect_addr argument.

  PR:	kern/162739

Approved by:	re (kib)
2011-11-28 08:14:59 +00:00
Marcel Moolenaar
8ce4509506 MFC rev. 227283, stable/9 rev. 228043:
Add check-password.4th and screen.4th to the boot image. They are
needed by the loader.

Approved by:	re (kib)
2011-11-27 20:14:00 +00:00
Marcel Moolenaar
cda77ba0a6 MFC rev. 227629, stable/9 rev 228041:
Wire the kernel text RWX, rather than RX. We're not quite ready
for having kernel text non-writable, because we still need to
apply relocations. On top of that, the PBVM page table has all
pages marked as RWX, so it's an inconsistency to begin with.

Approved by:	re (kib)
2011-11-27 20:10:32 +00:00
Michael Tuexen
c0e39aa199 MFC r228031:
Fix a warning reported by arundel@.
Fix a bug where the parameter length of a supported address types
parameter is set to a wrong value if the kernel is built with
with either INET or INET6, but not both.

Approved by: re@
2011-11-27 19:13:45 +00:00
Konstantin Belousov
4f5fe897a7 MFC r227952:
Fix a race between getvnode() dereferencing half-constructed file
and dupfdopen().

Approved by:	re (bz)
2011-11-27 19:02:18 +00:00
Konstantin Belousov
e72f35d9a3 MFC r227485:
To limit amount of the kernel memory allocated, and to optimize the
iteration over the fdsets, kern_select() limits the length of the
fdsets copied in by the last valid file descriptor index. If any bit
is set in a mask above the limit, current implementation ignores the
filedescriptor, instead of returning EBADF.

Fix the issue by scanning the tails of fdset before entering the
select loop and returning EBADF if any bit above last valid
filedescriptor index is set. The performance impact of the additional
check is only imposed on the (somewhat) buggy applications that pass
bad file descriptors to select(2) or pselect(2).

PR:	kern/155606, kern/162379
Approved by:	re (bz)
2011-11-27 19:00:52 +00:00
Warren Block
0c0acc32ce MFC 225861:
Fix a confusing sentence.
Other wording tweaks.

Approved by:	gjb (mentor)
Approved by:	re@ (kostikbel)
2011-11-26 14:19:08 +00:00
Konstantin Belousov
16bf182b7a MFC r227661:
Free unused allocation on error.

Approved by:	re (bz)
2011-11-26 08:23:25 +00:00
Konstantin Belousov
946b98f4be MFC r227660:
Fix fd leak.

Approved by:	re (bz)
2011-11-26 08:22:11 +00:00
Marius Strobl
27be128751 MFC: r227829, r227844
- Add a DEVMETHOD_END alias for KOBJMETHOD_END so that along with 'driver_t'
  and DEVMETHOD() we can fully hide the explicit mention of kobj(9) from
  device drivers.
- Update the device driver examples to use DEVMETHOD_END.

Submitted by:	jhb
Approved by:	re (kib)
2011-11-25 17:07:27 +00:00