Skip to content
Snippets Groups Projects
  1. May 17, 2016
  2. May 07, 2016
  3. May 05, 2016
  4. Apr 29, 2016
  5. Apr 20, 2016
  6. Mar 28, 2016
  7. Mar 26, 2016
    • Shawn Webb's avatar
      HBSD: Change ASLR defaults for 32bit systems. · 05feb3d9
      Shawn Webb authored
      
      On i386, the stack isn't randomized enough to provide enough space for
      the VDSO to be randomized. Bump the stack randomization up to 14 for
      32bit systems and lower the VDSO randomization to 8. This provides
      enough of a difference between the two to allow for both stack and
      VDSO randomization.
      
      Note that ASLR on 32bit systems is still rather weak. Not much entropy
      can be introduced into the stack and VDSO. Brute forcing the stack and
      VDSO is well within the realm of possibility. Users are strongly
      advised to migrate to 64bit systems.
      
      Signed-off-by: default avatarShawn Webb <shawn.webb@hardenedbsd.org>
      05feb3d9
    • Shawn Webb's avatar
      HBSD OPNsense: Separate out the ASLR code. · 6c73a592
      Shawn Webb authored
      
      On OPNsense's 16.7 roadmap is HardenedBSD's ASLR code. This commit
      separates out the ASLR code from the rest of our exploit mitigation
      and system hardening code.
      
      Testing and verification still need to be performed. Initial testing
      (compile + boot + `procstat -v PIDofPIEapplication) has been
      performed. More thorough testing should occur.
      
      Shared object load order randomization in the RTLD is not included in
      this patch. That will be discussed with the fine folks at OPNsense at
      a later time.
      
      Since OPNsense is based on FreeBSD 10.x, this patch will need to be
      backported to 10-STABLE. However, a "horizontal port" to 11-CURRENT,
      which is what this commit is, needed to be done first.
      
      Signed-off-by: default avatarShawn Webb <shawn.webb@hardenedbsd.org>
      6c73a592
  8. Mar 24, 2016
  9. Mar 22, 2016
  10. Mar 20, 2016
  11. Mar 17, 2016
    • loos's avatar
      Reapply r196551 which was accidentally reverted by r223637 (update to · d829a73e
      loos authored
      OpenBSD pf 4.5).
      
      Fix argument ordering to memcpy as well as the size of the copy in the
      (theoretical) case that pfi_buffer_cnt should be greater than ~_max.
      
      This fix the failure when you hit the self table size and force it to be
      resized.
      
      MFC after:	3 days
      Sponsored by:	Rubicon Communications (Netgate)
      d829a73e
    • glebius's avatar
      o Fix OpenSSH xauth(1) command injection. [SA-16:14] · 20ee75bc
      glebius authored
      o Fix incorrect argument validation in sysarch(2). [SA-16:15]
      o Fix Hyper-V KVP (Key-Value Pair) daemon indefinite sleep. [EN-16:04]
      o Fix hv_netvsc(4) incorrect TCP/IP checksums. [EN-16:05]
      
      Errata:         FreeBSD-EN-16:04.hyperv
      Errata:         FreeBSD-EN-16:05.hv_netvsc
      Security:       FreeBSD-SA-16:14.openssh-xauth, CVE-2016-3115
      Security:       FreeBSD-SA-16:15.sysarch, CVE-2016-1885
      Approved by:    so
      20ee75bc
  12. Mar 16, 2016
  13. Mar 10, 2016
  14. Mar 08, 2016
  15. Mar 06, 2016
  16. Feb 26, 2016
  17. Feb 14, 2016
  18. Feb 09, 2016
  19. Feb 08, 2016
    • Franco Fichtner's avatar
      boot: improve branding by adding a shiny logo and version info · 3c2aadda
      Franco Fichtner authored
      Logo kindly supplied by the Schellevis brothers @jschellevis
      and @adschellevis, technicolor version follows...  :)
      
      Some previous changes have been rolled back to avoid touching
      upstream code.
      3c2aadda
    • royger's avatar
      MFC r292258: · ec68d634
      royger authored
      hyperv/kvp: wake up the daemon if it's sleeping due to poll()
      
      Submitted by:           Dexuan Cui <decui@microsoft.com>
      Sponsored by:		Microsoft OSTC
      ec68d634
  20. Feb 01, 2016
    • royger's avatar
      MFC r291156: · 6a4afb0d
      royger authored
      Ignore the inbound checksum flags when doing packet forwarding in netvsc
      driver.
      
      Sponsored by:	Microsoft OSTC
      PR:		203630
      
      (cherry picked from commit a5f1c95b3c8a3114c0dd550de01326f7c442020a)
      6a4afb0d
  21. Jan 31, 2016
    • garga's avatar
      MFC r285945, r285960: · 23fc0a26
      garga authored
      Respect pf rule log option before log dropped packets with IP options or
      dangerous v6 headers
      
      Reviewed by:	gnn, eri
      Approved by:	gnn, glebius
      Obtained from:	pfSense
      Sponsored by:	Netgate
      Differential Revision:	https://reviews.freebsd.org/D3222
      23fc0a26
  22. Jan 30, 2016
  23. Jan 28, 2016
  24. Jan 27, 2016
  25. Jan 24, 2016
  26. Jan 15, 2016
  27. Jan 14, 2016
    • glebius's avatar
      o Fix filemon and bmake meta-mode stability issues. [EN-16:01] o Fix invalid... · 8d5e6697
      glebius authored
      o Fix filemon and bmake meta-mode stability issues. [EN-16:01] o Fix invalid TCP checksums with pf(4). [EN-16:02.pf] o Fix YP/NIS client library critical bug. [EN-16:03.yplib] o Fix SCTP ICMPv6 error message vulnerability. [SA-16:01.sctp] o Fix ntp panic threshold bypass vulnerability. [SA-16:02.ntp] o Fix Linux compatibility layer incorrect futex handling. [SA-16:03.linux] o Fix Linux compatibility layer setgroups(2) system call. [SA-16:04.linux] o Fix TCP MD5 signature denial of service. [SA-16:05.tcp] o Fix insecure default bsnmpd.conf permissions. [SA-16:06.bsnmpd]
      
      Errata:		FreeBSD-EN-16:01.filemon
      Errata:		FreeBSD-EN-16:02.pf
      Errata:		FreeBSD-EN-16:03.yplib
      Security:	FreeBSD-SA-16:01.sctp, CVE-2016-1879
      Security:	FreeBSD-SA-16:02.ntp, CVE-2015-5300
      Security:	FreeBSD-SA-16:03.linux, CVE-2016-1880
      Security:	FreeBSD-SA-16:04.linux, CVE-2016-1881
      Security:	FreeBSD-SA-16:05.tcp, CVE-2016-1882
      Security:	FreeBSD-SA-16:06.bsnmpd, CVE-2015-5677
      Approved by:	so
      8d5e6697