Commit Graph

6132 Commits

Author SHA1 Message Date
christos
725f9292f8 more flags. 2016-06-01 00:54:20 +00:00
christos
97989743a7 Ignore the first dlpi entry which is ourselves on NetBSD instead of having
a NULL name as on linux.
2016-06-01 00:53:35 +00:00
agc
eb3f7d2486 Import tzdata2016d from ftp://ftp.iana.org/tz/releases/tzdata2016d.tar.gz
Summary of changes in tzdata2016d (2016-04-17 22:50:29 -0700):
  * America/Caracas switches from -0430 to -04 on 2016-05-01 at 02:30.
  * Asia/Magadan switches from +10 to +11 on 2016-04-24 at 02:00.
  * New zone Asia/Tomsk, split off from Asia/Novosibirsk.
  * New zone Europe/Kirov, split off from Europe/Volgograd.
  * Russia and nearby locations had daylight-saving transitions on
    1992-03-29 at 02:00 and 1992-09-27 at 03:00, instead of on
    1992-03-28 at 23:00 and 1992-09-26 at 23:00.
  * Many corrections to historical time in Kazakhstan from 1991
    through 2005.
  * Mention Internet RFCs 7808 (TZDIST) and 7809 (CalDAV time zone references).

Summary of changes in tzdata2016c (2016-03-23 00:51:27 -0700):
  * Azerbaijan no longer observes DST.
  * Chile reverts from permanent to seasonal DST.
  * Europe/Kaliningrad and Europe/Vilnius changed from +03/+04 to
    +02/+03 on 1989-03-26, not 1991-03-31.
  * Several updates and URLs for historical and proposed Russian changes.
2016-06-01 00:03:14 +00:00
agc
2a93c63445 Add an extra set in the instructions (to make sure that you have the
public key the data was signed with)

Take the EDITOR variable from the environment and use that, defaulting to vi,
rather than just hardcoding vi.
2016-06-01 00:02:12 +00:00
christos
33b321f304 - hack BlockingMutex
- add NetBSD procmaps
- remove old unused source
2016-05-31 21:35:11 +00:00
christos
2a35c413e0 Add procmaps for NetBSD 2016-05-31 21:34:13 +00:00
christos
0fda9a31a2 Update sources and flags (compiles but missing stuff) 2016-05-31 20:47:52 +00:00
christos
0761ebe8d9 First steps to port this to NetBSD (compiles now but missing stuff) 2016-05-31 20:47:25 +00:00
abhinav
ad8c33366b Add the missing parameter "const char *pattern" to the fetchList* functions.
From Julian Fagir in PR lib/45579
2016-05-31 16:26:47 +00:00
pgoyette
a47b5fd6a6 Install man-link from fonts-conf.5 --> fonts.conf.5 to deal with an
erroneous cross-ref in xclock's man-page.  suggested by wiz@.

Fixes PR xsrc/49777
2016-05-31 02:35:49 +00:00
christos
e9a9a47d86 Make sure that all messages end in '\n' in make_message_rcsvalid() and
compensate for it in add_rcs_file().
2016-05-30 17:49:51 +00:00
christos
1563e28766 merge conflicts 2016-05-26 16:49:55 +00:00
christos
4f2aea9f2c Import bind 9.10.4-P1 2016-05-26 15:45:39 +00:00
prlw1
854e85e5bd Handle truncated DHCP messages, provided only the BOOTP vendor area
is truncated.  [3fd740f3ed]
OK from roy@
2016-05-26 09:09:47 +00:00
kamil
13f6226486 Fix building GCC-5.3 with GCC-6.1
Cherry-pick upstream patch:

From 1e5f1089dec3af328fd03125d6778f666d0bd4e4 Mon Sep 17 00:00:00 2001
From: edlinger <edlinger@138bc75d-0d04-0410-961f-82ee72b054a4>
Date: Thu, 25 Feb 2016 15:33:50 +0000
Subject: [PATCH] 2016-02-25  Bernd Edlinger  <bernd.edlinger@hotmail.de>

        Backported from mainline
        2016-02-19  Jakub Jelinek  <jakub@redhat.com>
                    Bernd Edlinger  <bernd.edlinger@hotmail.de>

        * Make-lang.in: Invoke gperf with -L C++.
        * cfns.gperf: Remove prototypes for hash and libc_name_p
        inlines.
        * cfns.h: Regenerated.
        * except.c (nothrow_libfn_p): Adjust.


git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/branches/gcc-5-branch@233720 138bc75d-0d04-0410-961f-82ee72b054a4


Verified to work with GCC 5.3 and 6.1.
2016-05-25 20:57:34 +00:00
skrll
60330fb799 Sync and allow arm to natively build 2016-05-24 21:25:25 +00:00
christos
63ea08216d Fix armv3 segv compiling mDNS.c, from:
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=62254
    https://gcc.gnu.org/ml/gcc-patches/2016-02/msg01095.html
2016-05-24 15:42:17 +00:00
skrll
fa15d5d3a4 More mknative re-runs 2016-05-24 13:00:00 +00:00
skrll
1afd582e81 More mknative re-run. 2016-05-24 10:46:13 +00:00
skrll
6e3cf83f8e Re-tun mknative for earm gdb 2016-05-24 09:16:56 +00:00
christos
2a2068fd64 Read and load the aux vector from a core file 2016-05-24 00:50:53 +00:00
christos
06c5bf7f1c PIE in the face! 2016-05-21 16:23:10 +00:00
christos
da360e79eb Fix infinite recursion when building i386 -fPIE in
src/external/mit/xorg/lib/libxcb/xkb.

https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=231599

PR debug/67355
* var-tracking.c (reverse_op): Don't add dummy zero to reverse
  ops that simplify back to the original value.
* alias.c (refs_newer_value_p): Cut off recursion for
  expressions containing the original value.
2016-05-19 20:27:36 +00:00
spz
54b54045cc Fixes for CVE-2016-0718 from upstream. 2016-05-17 23:53:02 +00:00
christos
5a6c14c844 Add RCSID's 2016-05-17 14:00:09 +00:00
christos
5b57c7ffa3 Adjust to 2.6.3. 2016-05-16 22:19:10 +00:00
chs
760a7ed1e9 apply the ustack() parts of freebsd r211608:
r211608 | rpaulo | 2010-08-22 03:53:32 -0700 (Sun, 22 Aug 2010) | 8 lines

	Kernel DTrace support for:
	o uregs  (sson@)
	o ustack (sson@)
	o /dev/dtrace/helper device (needed for USDT probes)

	The work done by me was:
	Sponsored by:   The FreeBSD Foundation

plus a few netbsd-specific tweaks from me.
fixes PR 50790.
2016-05-14 21:19:05 +00:00
spz
67c3041c33 merge conflicts, bump shlib version, add expat.pc 2016-05-14 14:39:39 +00:00
spz
8a91d82a35 Import of a new expat version. Upstream Changes:
Release 2.1.1 Sat March 12 2016
        Security fixes:
            #582: CVE-2015-1283 - Multiple integer overflows in XML_GetBuffer

        Bug fixes:
            #502: Fix potential null pointer dereference
            #520: Symbol XML_SetHashSalt was not exported
            Output of "xmlwf -h" was incomplete

        Other changes
            #503: Document behavior of calling XML_SetHashSalt with salt 0
            Minor improvements to man page xmlwf(1)
            Improvements to the experimental CMake build system
            libtool now invoked with --verbose
2016-05-14 14:30:18 +00:00
skrll
11d5fda1b2 Preserve the arm architecture version (if present) 2016-05-12 15:27:54 +00:00
skrll
c384c5b3fa For earm use the compiler to determine sf vs hf 2016-05-12 12:51:53 +00:00
skrll
74f1f7b042 Doh... don't add the ABI to 'os'. Hopefully arm is really fixed now. 2016-05-12 10:55:03 +00:00
skrll
8a8024b50c Sync config.guess with upstream, but maintain earm* stuff.
Fixes tools build on arm platform.
2016-05-12 08:43:49 +00:00
martin
6f47729145 Avoid a "conversion to '__uint16_t' from 'int' may alter its value"
error on some architectures (like m68k).
2016-05-09 20:28:08 +00:00
roy
ea7c879358 Define _OPENBSD_SOURCE so dhcpcd can access reallocarray(3). 2016-05-09 10:19:26 +00:00
roy
bc693cba55 Sync 2016-05-09 10:15:59 +00:00
christos
2805fbf632 adjust to new acpica 2016-05-04 19:28:15 +00:00
christos
01a3dc11b3 limit to gcc, requested by joerg. 2016-05-04 17:17:00 +00:00
christos
d6db3d67c9 prevent gcc from combining memset+malloc -> calloc inside calloc so that
we end up calling ourselves recursively.
2016-05-04 14:39:49 +00:00
mrg
729e5a7e04 use AC_USE_SYSTEM_EXTENSIONS in libiberty autoconf, which arranges for
_GNU_SOURCE to be defined for systems that need it (like glibc ones.)

be sure to find the right config.h for host programs.

these fixes combined make builds on debian 7 complete for me.
2016-05-04 00:28:23 +00:00
christos
02ec25e568 http://w1.fi/security/2016-1/0004-Reject-SET_CRED-commands-with-newline-characters-in-.patch
Many of the global configuration parameters are written as strings
without filtering and if there is an embedded newline character in the
value, unexpected configuration file data might be written.

This fixes an issue where wpa_supplicant could have updated the
configuration file global parameter with arbitrary data from the control
interface or D-Bus interface. While those interfaces are supposed to be
accessible only for trusted users/applications, it may be possible that
an untrusted user has access to a management software component that
does not validate the value of a parameter before passing it to
wpa_supplicant.

This could allow such an untrusted user to inject almost arbitrary data
into the configuration file. Such configuration file could result in
wpa_supplicant trying to load a library (e.g., opensc_engine_path,
pkcs11_engine_path, pkcs11_module_path, load_dynamic_eap) from user
controlled location when starting again. This would allow code from that
library to be executed under the wpa_supplicant process privileges.
2016-05-03 18:22:28 +00:00
christos
32a650932f http://w1.fi/security/2016-1/0004-Reject-SET_CRED-commands-with-newline-characters-in-.patch
Most of the cred block parameters are written as strings without
filtering and if there is an embedded newline character in the value,
unexpected configuration file data might be written.

This fixes an issue where wpa_supplicant could have updated the
configuration file cred parameter with arbitrary data from the control
interface or D-Bus interface. While those interfaces are supposed to be
accessible only for trusted users/applications, it may be possible that
an untrusted user has access to a management software component that
does not validate the credential value before passing it to
wpa_supplicant.

This could allow such an untrusted user to inject almost arbitrary data
into the configuration file. Such configuration file could result in
wpa_supplicant trying to load a library (e.g., opensc_engine_path,
pkcs11_engine_path, pkcs11_module_path, load_dynamic_eap) from user
controlled location when starting again. This would allow code from that
library to be executed under the wpa_supplicant process privileges.
2016-05-03 18:21:54 +00:00
christos
9f37edd889 http://w1.fi/security/2016-1/0003-Remove-newlines-from-wpa_supplicant-config-network-o.patch
Spurious newlines output while writing the config file can corrupt the
wpa_supplicant configuration. Avoid writing these for the network block
parameters. This is a generic filter that cover cases that may not have
been explicitly addressed with a more specific commit to avoid control
characters in the psk parameter.
2016-05-03 18:21:14 +00:00
christos
bc93796efb http://w1.fi/security/2016-1/0002-Reject-psk-parameter-set-with-invalid-passphrase-cha.patch
WPA/WPA2-Personal passphrase is not allowed to include control
characters. Reject a passphrase configuration attempt if that passphrase
includes an invalid passphrase.

This fixes an issue where wpa_supplicant could have updated the
configuration file psk parameter with arbitrary data from the control
interface or D-Bus interface. While those interfaces are supposed to be
accessible only for trusted users/applications, it may be possible that
an untrusted user has access to a management software component that
does not validate the passphrase value before passing it to
wpa_supplicant.

This could allow such an untrusted user to inject up to 63 characters of
almost arbitrary data into the configuration file. Such configuration
file could result in wpa_supplicant trying to load a library (e.g.,
opensc_engine_path, pkcs11_engine_path, pkcs11_module_path,
load_dynamic_eap) from user controlled location when starting again.
This would allow code from that library to be executed under the
wpa_supplicant process privileges.
2016-05-03 18:20:30 +00:00
christos
7d146f42f6 http://w1.fi/security/2016-1/0001-WPS-Reject-a-Credential-with-invalid-passphrase.patch
WPA/WPA2-Personal passphrase is not allowed to include control
characters. Reject a Credential received from a WPS Registrar both as
STA (Credential) and AP (AP Settings) if the credential is for WPAPSK or
WPA2PSK authentication type and includes an invalid passphrase.

This fixes an issue where hostapd or wpa_supplicant could have updated
the configuration file PSK/passphrase parameter with arbitrary data from
an external device (Registrar) that may not be fully trusted. Should
such data include a newline character, the resulting configuration file
could become invalid and fail to be parsed.
2016-05-03 18:19:44 +00:00
christos
9da9a79f42 search for the proper variable in the sysroot case. 2016-05-02 23:22:39 +00:00
christos
68dbbb44ff merge conflicts 2016-05-01 23:32:00 +00:00
joerg
1bf1694ac2 Drop stray ^ from output. Found by Abhinav. 2016-05-01 20:25:37 +00:00
christos
ae49d4a49c ---
(4.2.8p7) 2016/04/26 Released by Harlan Stenn <stenn@ntp.org>

* [Sec 2901] KoD packets must have non-zero transmit timestamps.  HStenn.
* [Sec 2936] Skeleton Key: Any system knowing the trusted key can serve
  time. Include passive servers in this check. HStenn.
* [Sec 2945] Additional KoD packet checks.  HStenn.
* [Sec 2978] Interleave can be partially triggered.  HStenn.
* [Sec 3007] Validate crypto-NAKs.  Danny Mayer.
* [Sec 3008] Always check the return value of ctl_getitem().
  - initial work by HStenn
  - Additional cleanup of ctl_getitem by perlinger@ntp.org
* [Sec 3009] Crafted addpeer with hmode > 7 causes OOB error. perlinger@ntp.org
   - added more stringent checks on packet content
* [Sec 3010] remote configuration trustedkey/requestkey values
  are not properly validated. perlinger@ntp.org
  - sidekick: Ignore keys that have an unsupported MAC algorithm
    but are otherwise well-formed
* [Sec 3011] Duplicate IPs on unconfig directives will cause an assertion botch
  - graciously accept the same IP multiple times. perlinger@ntp.org
* [Sec 3020] Refclock impersonation.  HStenn.
* [Bug 2831]  Segmentation Fault in DNS lookup during startup. perlinger@ntp.org
  - fixed yet another race condition in the threaded resolver code.
* [Bug 2858] bool support.  Use stdbool.h when available.  HStenn.
* [Bug 2879] Improve NTP security against timing attacks. perlinger@ntp.org
  - integrated patches by Loganaden Velvidron <logan@ntp.org>
    with some modifications & unit tests
* [Bug 2952] Symmetric active/passive mode is broken.  HStenn.
* [Bug 2960] async name resolution fixes for chroot() environments.
  Reinhard Max.
* [Bug 2994] Systems with HAVE_SIGNALED_IO fail to compile. perlinger@ntp.org
* [Bug 2995] Fixes to compile on Windows
* [Bug 2999] out-of-bounds access in 'is_safe_filename()'. perlinger@ntp.org
* [Bug 3013] Fix for ssl_init.c SHA1 test. perlinger@ntp.org
  - Patch provided by Ch. Weisgerber
* [Bug 3015] ntpq: config-from-file: "request contains an unprintable character"
  - A change related to [Bug 2853] forbids trailing white space in
    remote config commands. perlinger@ntp.org
* [Bug 3019] NTPD stops processing packets after ERROR_HOST_UNREACHABLE
  - report and patch from Aleksandr Kostikov.
  - Overhaul of Windows IO completion port handling. perlinger@ntp.org
* [Bug 3022] authkeys.c should be refactored. perlinger@ntp.org
  - fixed memory leak in access list (auth[read]keys.c)
  - refactored handling of key access lists (auth[read]keys.c)
  - reduced number of error branches (authreadkeys.c)
* [Bug 3023] ntpdate cannot correct dates in the future. perlinger@ntp.org
* [Bug 3030] ntpq needs a general way to specify refid output format.  HStenn.
* [Bug 3031] ntp broadcastclient unable to synchronize to an server
             when the time of server changed. perlinger@ntp.org
  - Check the initial delay calculation and reject/unpeer the broadcast
    server if the delay exceeds 50ms. Retry again after the next
    broadcast packet.
* [Bug 3036] autokey trips an INSIST in authistrustedip().  Harlan Stenn.
* Document ntp.key's optional IP list in authenetic.html.  Harlan Stenn.
* Update html/xleave.html documentation.  Harlan Stenn.
* Update ntp.conf documentation.  Harlan Stenn.
* Fix some Credit: attributions in the NEWS file.  Harlan Stenn.
* Fix typo in html/monopt.html.  Harlan Stenn.
* Add README.pullrequests.  Harlan Stenn.
* Cleanup to include/ntp.h.  Harlan Stenn.

---
(4.2.8p6) 2016/01/20 Released by Harlan Stenn <stenn@ntp.org>

* [Sec 2935] Deja Vu: Replay attack on authenticated broadcast mode. HStenn.
* [Sec 2936] Skeleton Key: Any trusted key system can serve time. HStenn.
* [Sec 2937] ntpq: nextvar() missing length check. perlinger@ntp.org
* [Sec 2938] ntpq saveconfig command allows dangerous characters
  in filenames. perlinger@ntp.org
* [Sec 2939] reslist NULL pointer dereference.  perlinger@ntp.org
* [Sec 2940] Stack exhaustion in recursive traversal of restriction
  list. perlinger@ntp.org
* [Sec 2942]: Off-path DoS attack on auth broadcast mode.  HStenn.
* [Sec 2945] Zero Origin Timestamp Bypass. perlinger@ntp.org
* [Sec 2948] Potential Infinite Loop in ntpq ( and ntpdc) perlinger@ntp.org
* [Bug 2772] adj_systime overflows tv_usec. perlinger@ntp.org
* [Bug 2814] msyslog deadlock when signaled. perlinger@ntp.org
  - applied patch by shenpeng11@huawei.com with minor adjustments
* [Bug 2882] Look at ntp_request.c:list_peers_sum(). perlinger@ntp.org
* [Bug 2891] Deadlock in deferred DNS lookup framework. perlinger@ntp.org
* [Bug 2892] Several test cases assume IPv6 capabilities even when
             IPv6 is disabled in the build. perlinger@ntp.org
  - Found this already fixed, but validation led to cleanup actions.
* [Bug 2905] DNS lookups broken. perlinger@ntp.org
  - added limits to stack consumption, fixed some return code handling
* [Bug 2971] ntpq bails on ^C: select fails: Interrupted system call
  - changed stacked/nested handling of CTRL-C. perlinger@ntp.org
  - make CTRL-C work for retrieval and printing od MRU list. perlinger@ntp.org
* [Bug 2980] reduce number of warnings. perlinger@ntp.org
  - integrated several patches from Havard Eidnes (he@uninett.no)
* [Bug 2985] bogus calculation in authkeys.c perlinger@ntp.org
  - implement 'auth_log2()' using integer bithack instead of float calculation
* Make leapsec_query debug messages less verbose.  Harlan Stenn.
* Disable incomplete t-ntp_signd.c test.  Harlan Stenn.

---
2016-05-01 15:57:23 +00:00
joerg
a114fff726 Revert. For whatever reasons, the ELF visibility attributes are not
meant to be a useful indicator of what an object expects, so for linking
against a protected symbol, it must be declared as normal.
2016-04-29 16:25:55 +00:00