Skip to content
Snippets Groups Projects
  1. Dec 23, 2018
  2. Dec 19, 2018
    • emaste's avatar
      11.2-RELEASE-p7 UPDATING · 91cee16f
      emaste authored
      Approved by:	so
      Security:	FreeBSD-SA-18:15.bootpd
      Security:	FreeBSD-EN-18:16.ptrace
      Security:	FreeBSD-EN-18:17.vm
      Security:	FreeBSD-EN-18:18.zfs
      91cee16f
    • emaste's avatar
      MFS11 r342229: bootpd: validate hardware type · a6f06851
      emaste authored
      Due to insufficient validation of network-provided data it may have been
      possible for a malicious actor to craft a bootp packet which could cause
      a stack buffer overflow.
      
      admbugs:	850
      Reported by:	Reno Robert
      Reviewed by:	markj
      Approved by:	so
      Security:	FreeBSD-SA-18:15.bootpd
      Sponsored by:	The FreeBSD Foundation
      a6f06851
    • emaste's avatar
      MFS11 r341828: Resolve a hang in ZFS during vnode reclaimation · a9a2c649
      emaste authored
        This is caused by a deadlock between zil_commit() and zfs_zget()
        Add a way for zfs_zget() to break out of the retry loop in the common case
      
      PR:		229614, 231117
      Submitted by:	allanjude
      Approved by:	so
      Security:	FreeBSD-EN-18:18.zfs
      Sponsored by:	Klara Systems, The FreeBSD Foundation
      a9a2c649
    • emaste's avatar
      MFS11 r341401: Update the free page count when blacklisting pages. · b616da8d
      emaste authored
      PR:		231296
      Submitted by:	markj
      Approved by:	so
      Security:	FreeBSD-EN-18:17.vm
      Sponsored by:	The FreeBSD Foundation
      b616da8d
    • emaste's avatar
      MFS11 r340290: Only clear a pending thread event if one is pending. · 6cd05ccb
      emaste authored
      This fixes a panic when attaching to an already-stopped process.
      
      Also do some other clean ups for control flow of sendsig section.
      
      Submitted by:	markj
      Approved by:	so
      Security:	FreeBSD-EN-18:16.ptrace
      Sponsored by:	The FreeBSD Foundation
      6cd05ccb
  3. Dec 12, 2018
  4. Dec 05, 2018
  5. Nov 28, 2018
  6. Nov 04, 2018
  7. Nov 01, 2018
  8. Oct 21, 2018
    • kp's avatar
      MFC r334375, r334379: · ea449cda
      kp authored
      pf: Replace rwlock on PF_RULES_LOCK with rmlock
      
      Given that PF_RULES_LOCK is a mostly read lock, replace the rwlock with rmlock.
      This change improves packet processing rate in high pps environments.
      Benchmarking by olivier@ shows a 65% improvement in pps.
      
      While here, also eliminate all appearances of "sys/rwlock.h" includes since it
      is not used anymore.
      
      Submitted by:   farrokhi@
      ea449cda
    • kp's avatar
      MFC r337969: · 4f962c33
      kp authored
      pf: Limit the maximum number of fragments per packet
      
      Similar to the network stack issue fixed in r337782 pf did not limit the number
      of fragments per packet, which could be exploited to generate high CPU loads
      with a crafted series of packets.
      
      Limit each packet to no more than 64 fragments. This should be sufficient on
      typical networks to allow maximum-sized IP frames.
      
      This addresses the issue for both IPv4 and IPv6.
      
      Security:	CVE-2018-5391
      Sponsored by:	Klara Systems
      4f962c33
    • kp's avatar
      MFC r335816: · 6f1207f7
      kp authored
      pfsync: Fix state sync during initial bulk update
      
      States learned via pfsync from a peer with the same ruleset checksum were not
      getting assigned to rules like they should because pfsync_in_upd() wasn't
      passing the PFSYNC_SI_CKSUM flag along to pfsync_state_import.
      
      PR:		229092
      Submitted by:	Kajetan Staszkiewicz <vegeta tuxpowered.net>
      Obtained from:	OpenBSD
      Sponsored by:	InnoGames GmbH
      6f1207f7
    • eugen's avatar
      MFC r336195: unbreak dhclient(8) option 26 processing · 4ab5484a
      eugen authored
        Make dhclient(8) verify if new MTU (option 26) differs from current one
        and skip unneeded MTU change. This check eliminates infinite loop
        of MTU change / link flap / lease verification / MTU change / link flap etc.
        in case of some NIC drivers like em(4) or igb(4).
      
      PR:		229432
      Approved by:	mav (mentor)
      4ab5484a
  9. Oct 18, 2018
  10. Oct 16, 2018
  11. Oct 11, 2018
  12. Oct 08, 2018
  13. Oct 07, 2018