Commit Graph

6110 Commits

Author SHA1 Message Date
christos
da360e79eb Fix infinite recursion when building i386 -fPIE in
src/external/mit/xorg/lib/libxcb/xkb.

https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=231599

PR debug/67355
* var-tracking.c (reverse_op): Don't add dummy zero to reverse
  ops that simplify back to the original value.
* alias.c (refs_newer_value_p): Cut off recursion for
  expressions containing the original value.
2016-05-19 20:27:36 +00:00
spz
54b54045cc Fixes for CVE-2016-0718 from upstream. 2016-05-17 23:53:02 +00:00
christos
5a6c14c844 Add RCSID's 2016-05-17 14:00:09 +00:00
christos
5b57c7ffa3 Adjust to 2.6.3. 2016-05-16 22:19:10 +00:00
chs
760a7ed1e9 apply the ustack() parts of freebsd r211608:
r211608 | rpaulo | 2010-08-22 03:53:32 -0700 (Sun, 22 Aug 2010) | 8 lines

	Kernel DTrace support for:
	o uregs  (sson@)
	o ustack (sson@)
	o /dev/dtrace/helper device (needed for USDT probes)

	The work done by me was:
	Sponsored by:   The FreeBSD Foundation

plus a few netbsd-specific tweaks from me.
fixes PR 50790.
2016-05-14 21:19:05 +00:00
spz
67c3041c33 merge conflicts, bump shlib version, add expat.pc 2016-05-14 14:39:39 +00:00
spz
8a91d82a35 Import of a new expat version. Upstream Changes:
Release 2.1.1 Sat March 12 2016
        Security fixes:
            #582: CVE-2015-1283 - Multiple integer overflows in XML_GetBuffer

        Bug fixes:
            #502: Fix potential null pointer dereference
            #520: Symbol XML_SetHashSalt was not exported
            Output of "xmlwf -h" was incomplete

        Other changes
            #503: Document behavior of calling XML_SetHashSalt with salt 0
            Minor improvements to man page xmlwf(1)
            Improvements to the experimental CMake build system
            libtool now invoked with --verbose
2016-05-14 14:30:18 +00:00
skrll
11d5fda1b2 Preserve the arm architecture version (if present) 2016-05-12 15:27:54 +00:00
skrll
c384c5b3fa For earm use the compiler to determine sf vs hf 2016-05-12 12:51:53 +00:00
skrll
74f1f7b042 Doh... don't add the ABI to 'os'. Hopefully arm is really fixed now. 2016-05-12 10:55:03 +00:00
skrll
8a8024b50c Sync config.guess with upstream, but maintain earm* stuff.
Fixes tools build on arm platform.
2016-05-12 08:43:49 +00:00
martin
6f47729145 Avoid a "conversion to '__uint16_t' from 'int' may alter its value"
error on some architectures (like m68k).
2016-05-09 20:28:08 +00:00
roy
ea7c879358 Define _OPENBSD_SOURCE so dhcpcd can access reallocarray(3). 2016-05-09 10:19:26 +00:00
roy
bc693cba55 Sync 2016-05-09 10:15:59 +00:00
christos
2805fbf632 adjust to new acpica 2016-05-04 19:28:15 +00:00
christos
01a3dc11b3 limit to gcc, requested by joerg. 2016-05-04 17:17:00 +00:00
christos
d6db3d67c9 prevent gcc from combining memset+malloc -> calloc inside calloc so that
we end up calling ourselves recursively.
2016-05-04 14:39:49 +00:00
mrg
729e5a7e04 use AC_USE_SYSTEM_EXTENSIONS in libiberty autoconf, which arranges for
_GNU_SOURCE to be defined for systems that need it (like glibc ones.)

be sure to find the right config.h for host programs.

these fixes combined make builds on debian 7 complete for me.
2016-05-04 00:28:23 +00:00
christos
02ec25e568 http://w1.fi/security/2016-1/0004-Reject-SET_CRED-commands-with-newline-characters-in-.patch
Many of the global configuration parameters are written as strings
without filtering and if there is an embedded newline character in the
value, unexpected configuration file data might be written.

This fixes an issue where wpa_supplicant could have updated the
configuration file global parameter with arbitrary data from the control
interface or D-Bus interface. While those interfaces are supposed to be
accessible only for trusted users/applications, it may be possible that
an untrusted user has access to a management software component that
does not validate the value of a parameter before passing it to
wpa_supplicant.

This could allow such an untrusted user to inject almost arbitrary data
into the configuration file. Such configuration file could result in
wpa_supplicant trying to load a library (e.g., opensc_engine_path,
pkcs11_engine_path, pkcs11_module_path, load_dynamic_eap) from user
controlled location when starting again. This would allow code from that
library to be executed under the wpa_supplicant process privileges.
2016-05-03 18:22:28 +00:00
christos
32a650932f http://w1.fi/security/2016-1/0004-Reject-SET_CRED-commands-with-newline-characters-in-.patch
Most of the cred block parameters are written as strings without
filtering and if there is an embedded newline character in the value,
unexpected configuration file data might be written.

This fixes an issue where wpa_supplicant could have updated the
configuration file cred parameter with arbitrary data from the control
interface or D-Bus interface. While those interfaces are supposed to be
accessible only for trusted users/applications, it may be possible that
an untrusted user has access to a management software component that
does not validate the credential value before passing it to
wpa_supplicant.

This could allow such an untrusted user to inject almost arbitrary data
into the configuration file. Such configuration file could result in
wpa_supplicant trying to load a library (e.g., opensc_engine_path,
pkcs11_engine_path, pkcs11_module_path, load_dynamic_eap) from user
controlled location when starting again. This would allow code from that
library to be executed under the wpa_supplicant process privileges.
2016-05-03 18:21:54 +00:00
christos
9f37edd889 http://w1.fi/security/2016-1/0003-Remove-newlines-from-wpa_supplicant-config-network-o.patch
Spurious newlines output while writing the config file can corrupt the
wpa_supplicant configuration. Avoid writing these for the network block
parameters. This is a generic filter that cover cases that may not have
been explicitly addressed with a more specific commit to avoid control
characters in the psk parameter.
2016-05-03 18:21:14 +00:00
christos
bc93796efb http://w1.fi/security/2016-1/0002-Reject-psk-parameter-set-with-invalid-passphrase-cha.patch
WPA/WPA2-Personal passphrase is not allowed to include control
characters. Reject a passphrase configuration attempt if that passphrase
includes an invalid passphrase.

This fixes an issue where wpa_supplicant could have updated the
configuration file psk parameter with arbitrary data from the control
interface or D-Bus interface. While those interfaces are supposed to be
accessible only for trusted users/applications, it may be possible that
an untrusted user has access to a management software component that
does not validate the passphrase value before passing it to
wpa_supplicant.

This could allow such an untrusted user to inject up to 63 characters of
almost arbitrary data into the configuration file. Such configuration
file could result in wpa_supplicant trying to load a library (e.g.,
opensc_engine_path, pkcs11_engine_path, pkcs11_module_path,
load_dynamic_eap) from user controlled location when starting again.
This would allow code from that library to be executed under the
wpa_supplicant process privileges.
2016-05-03 18:20:30 +00:00
christos
7d146f42f6 http://w1.fi/security/2016-1/0001-WPS-Reject-a-Credential-with-invalid-passphrase.patch
WPA/WPA2-Personal passphrase is not allowed to include control
characters. Reject a Credential received from a WPS Registrar both as
STA (Credential) and AP (AP Settings) if the credential is for WPAPSK or
WPA2PSK authentication type and includes an invalid passphrase.

This fixes an issue where hostapd or wpa_supplicant could have updated
the configuration file PSK/passphrase parameter with arbitrary data from
an external device (Registrar) that may not be fully trusted. Should
such data include a newline character, the resulting configuration file
could become invalid and fail to be parsed.
2016-05-03 18:19:44 +00:00
christos
9da9a79f42 search for the proper variable in the sysroot case. 2016-05-02 23:22:39 +00:00
christos
68dbbb44ff merge conflicts 2016-05-01 23:32:00 +00:00
joerg
1bf1694ac2 Drop stray ^ from output. Found by Abhinav. 2016-05-01 20:25:37 +00:00
christos
ae49d4a49c ---
(4.2.8p7) 2016/04/26 Released by Harlan Stenn <stenn@ntp.org>

* [Sec 2901] KoD packets must have non-zero transmit timestamps.  HStenn.
* [Sec 2936] Skeleton Key: Any system knowing the trusted key can serve
  time. Include passive servers in this check. HStenn.
* [Sec 2945] Additional KoD packet checks.  HStenn.
* [Sec 2978] Interleave can be partially triggered.  HStenn.
* [Sec 3007] Validate crypto-NAKs.  Danny Mayer.
* [Sec 3008] Always check the return value of ctl_getitem().
  - initial work by HStenn
  - Additional cleanup of ctl_getitem by perlinger@ntp.org
* [Sec 3009] Crafted addpeer with hmode > 7 causes OOB error. perlinger@ntp.org
   - added more stringent checks on packet content
* [Sec 3010] remote configuration trustedkey/requestkey values
  are not properly validated. perlinger@ntp.org
  - sidekick: Ignore keys that have an unsupported MAC algorithm
    but are otherwise well-formed
* [Sec 3011] Duplicate IPs on unconfig directives will cause an assertion botch
  - graciously accept the same IP multiple times. perlinger@ntp.org
* [Sec 3020] Refclock impersonation.  HStenn.
* [Bug 2831]  Segmentation Fault in DNS lookup during startup. perlinger@ntp.org
  - fixed yet another race condition in the threaded resolver code.
* [Bug 2858] bool support.  Use stdbool.h when available.  HStenn.
* [Bug 2879] Improve NTP security against timing attacks. perlinger@ntp.org
  - integrated patches by Loganaden Velvidron <logan@ntp.org>
    with some modifications & unit tests
* [Bug 2952] Symmetric active/passive mode is broken.  HStenn.
* [Bug 2960] async name resolution fixes for chroot() environments.
  Reinhard Max.
* [Bug 2994] Systems with HAVE_SIGNALED_IO fail to compile. perlinger@ntp.org
* [Bug 2995] Fixes to compile on Windows
* [Bug 2999] out-of-bounds access in 'is_safe_filename()'. perlinger@ntp.org
* [Bug 3013] Fix for ssl_init.c SHA1 test. perlinger@ntp.org
  - Patch provided by Ch. Weisgerber
* [Bug 3015] ntpq: config-from-file: "request contains an unprintable character"
  - A change related to [Bug 2853] forbids trailing white space in
    remote config commands. perlinger@ntp.org
* [Bug 3019] NTPD stops processing packets after ERROR_HOST_UNREACHABLE
  - report and patch from Aleksandr Kostikov.
  - Overhaul of Windows IO completion port handling. perlinger@ntp.org
* [Bug 3022] authkeys.c should be refactored. perlinger@ntp.org
  - fixed memory leak in access list (auth[read]keys.c)
  - refactored handling of key access lists (auth[read]keys.c)
  - reduced number of error branches (authreadkeys.c)
* [Bug 3023] ntpdate cannot correct dates in the future. perlinger@ntp.org
* [Bug 3030] ntpq needs a general way to specify refid output format.  HStenn.
* [Bug 3031] ntp broadcastclient unable to synchronize to an server
             when the time of server changed. perlinger@ntp.org
  - Check the initial delay calculation and reject/unpeer the broadcast
    server if the delay exceeds 50ms. Retry again after the next
    broadcast packet.
* [Bug 3036] autokey trips an INSIST in authistrustedip().  Harlan Stenn.
* Document ntp.key's optional IP list in authenetic.html.  Harlan Stenn.
* Update html/xleave.html documentation.  Harlan Stenn.
* Update ntp.conf documentation.  Harlan Stenn.
* Fix some Credit: attributions in the NEWS file.  Harlan Stenn.
* Fix typo in html/monopt.html.  Harlan Stenn.
* Add README.pullrequests.  Harlan Stenn.
* Cleanup to include/ntp.h.  Harlan Stenn.

---
(4.2.8p6) 2016/01/20 Released by Harlan Stenn <stenn@ntp.org>

* [Sec 2935] Deja Vu: Replay attack on authenticated broadcast mode. HStenn.
* [Sec 2936] Skeleton Key: Any trusted key system can serve time. HStenn.
* [Sec 2937] ntpq: nextvar() missing length check. perlinger@ntp.org
* [Sec 2938] ntpq saveconfig command allows dangerous characters
  in filenames. perlinger@ntp.org
* [Sec 2939] reslist NULL pointer dereference.  perlinger@ntp.org
* [Sec 2940] Stack exhaustion in recursive traversal of restriction
  list. perlinger@ntp.org
* [Sec 2942]: Off-path DoS attack on auth broadcast mode.  HStenn.
* [Sec 2945] Zero Origin Timestamp Bypass. perlinger@ntp.org
* [Sec 2948] Potential Infinite Loop in ntpq ( and ntpdc) perlinger@ntp.org
* [Bug 2772] adj_systime overflows tv_usec. perlinger@ntp.org
* [Bug 2814] msyslog deadlock when signaled. perlinger@ntp.org
  - applied patch by shenpeng11@huawei.com with minor adjustments
* [Bug 2882] Look at ntp_request.c:list_peers_sum(). perlinger@ntp.org
* [Bug 2891] Deadlock in deferred DNS lookup framework. perlinger@ntp.org
* [Bug 2892] Several test cases assume IPv6 capabilities even when
             IPv6 is disabled in the build. perlinger@ntp.org
  - Found this already fixed, but validation led to cleanup actions.
* [Bug 2905] DNS lookups broken. perlinger@ntp.org
  - added limits to stack consumption, fixed some return code handling
* [Bug 2971] ntpq bails on ^C: select fails: Interrupted system call
  - changed stacked/nested handling of CTRL-C. perlinger@ntp.org
  - make CTRL-C work for retrieval and printing od MRU list. perlinger@ntp.org
* [Bug 2980] reduce number of warnings. perlinger@ntp.org
  - integrated several patches from Havard Eidnes (he@uninett.no)
* [Bug 2985] bogus calculation in authkeys.c perlinger@ntp.org
  - implement 'auth_log2()' using integer bithack instead of float calculation
* Make leapsec_query debug messages less verbose.  Harlan Stenn.
* Disable incomplete t-ntp_signd.c test.  Harlan Stenn.

---
2016-05-01 15:57:23 +00:00
joerg
a114fff726 Revert. For whatever reasons, the ELF visibility attributes are not
meant to be a useful indicator of what an object expects, so for linking
against a protected symbol, it must be declared as normal.
2016-04-29 16:25:55 +00:00
christos
d7245a7577 include stdio.h for NULL 2016-04-28 11:45:02 +00:00
christos
f107a05fec remove incorrect comment 2016-04-28 11:38:41 +00:00
wiz
b3e27845a3 Sort SEE ALSO. New sentence, new line. 2016-04-28 08:17:04 +00:00
wiz
307c12e07c Fix xrefs. Sort sections. Remove trailing whitespace. 2016-04-28 08:16:09 +00:00
wiz
e09a2cef0e Replace Xr to itself with Nm. 2016-04-28 07:06:11 +00:00
christos
4187cd60b2 Introduce dt_bootfile() and use it to avoid hard-coded kernel values. Fixes
dtrace hang for kernels not named netbsd.
2016-04-28 00:02:40 +00:00
chs
cba709e375 the netbsd version of PT_LWPINFO is different from the freebsd version
in that we use lp_lwpid as an input to say which lwp to operate on.
freebsd passes the lwpid as the pid, which works fine there
since freebsd has globally unique LWP IDs which are also distinct
from process IDs.  the libproc interface that uses this ptrace() call
is only supposed to return info for the process's representative LWP,
so just initialize pl_lwpid to 1 before using it.
2016-04-26 14:29:58 +00:00
chs
d22d83420c use the netbsd path for separate debuginfo files.
only attempt to look up symbols in the dynsym table if the object
actually has one, which a separate debuginfo file does not.
2016-04-26 14:28:39 +00:00
chs
c8860c9bc8 fix the lookup of the rtld postinit hook to use the netbsd names
for the object and symbol rather than the freebsd names.
remove the lookups of the preinit and dlactivity hooks
(which do not currently exist separately in rtld on netbsd) for now
since this rtld_db implementation does not report those events anyway.
2016-04-26 14:26:49 +00:00
christos
f8e7276e29 CID 1358677: (Negative returns) tuck in poll_fd assignment in eloop_open() 2016-04-24 18:20:40 +00:00
christos
5ca807aba7 CID 1358676: Forward NULL. 2016-04-24 18:16:05 +00:00
christos
75518e7407 Propagate PLT fix from our gcc-5.3 tree:
Some functions like __udivsi3 are used in other assembly files like __umodsi3.
Use PLT linkage to avoid text relocations.

XXX: pullup-7
2016-04-22 18:05:52 +00:00
christos
17ab1145c9 Undo previous; wrong tree. 2016-04-22 18:05:13 +00:00
christos
6d71bd475a Propagate PLT fix from our gcc-5.3 tree:
Some functions like __udivsi3 are used in other assembly files like __umodsi3.
Use PLT linkage to avoid text relocations.

XXX: pullup-7
2016-04-22 18:03:54 +00:00
christos
4c876db4b4 Print the symbol that caused the text relocation for m68k like we do for
other platforms.
2016-04-22 17:40:36 +00:00
christos
97bb42372a Some functions like __udivsi3 are used in other assembly files like __umodsi3.
Use PLT linkage to avoid text relocations.
2016-04-22 17:39:38 +00:00
mrg
8398abcc05 mknative for GCC 5.3 and *arm* after netbsd-elf.h order fix. 2016-04-22 01:45:26 +00:00
skrll
6e4fa334ab Re-order includes so that ARM_TARGET2_DWARF_FORMAT takes effect
Fixes PR/51066: C++ text relocations
2016-04-21 16:09:16 +00:00
mrg
0010df8996 regenerate mknative-gcc for GCC 4.8 and *arm* 2016-04-21 07:24:09 +00:00
christos
d5fc259be3 WARNS=1 2016-04-20 17:18:52 +00:00
roy
302733a775 Sync 2016-04-20 08:53:01 +00:00
skrll
a7d674ca52 Re-order includes so that ARM_TARGET2_DWARF_FORMAT takes effect
Fixes PR/51066: C++ text relocations
2016-04-20 06:51:03 +00:00