Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (1h)  netbsd-8 (5d)  netbsd-10 (6d)  netbsd-9 (12d)  thorpej-ifq (176d)  thorpej-altq-separation (178d) 

2024-05-10 15:52:27 UTC Now

2015-03-21 16:42:55 UTC nick-nhusb commitmail json YAML

G/C unused variable/code

(skrll)

2015-03-21 16:42:17 UTC MAIN commitmail json YAML

Actually create the "done" files, and test them for existence.

(apb)

2015-03-21 15:56:54 UTC MAIN commitmail json YAML

2015-03-21 15:54:11 UTC MAIN commitmail json YAML

zoneinfo: Import tzdata2015b. [apb 20150321]
Also s/tzdata/tzcode in another line.

(apb)

2015-03-21 15:52:19 UTC MAIN commitmail json YAML

We have tzdata2015b.

(apb)

2015-03-21 15:51:21 UTC MAIN commitmail json YAML

Update tzdata2netbsd for tzdata2015b.

* Edit version numbers.
* Make the script deal better with being re-run multiple times.  It
  now keeps a status file for each non-trivial step, and doesn't repeat
  the step if the sttaus file exists.
* Instead of spawning a subshell to resolve merge conflicts, print a message
  and exit, with a suggestion to rte-run the script after conflicts
  are resolved.
* Check whether there are any conflicts before trying to do anything
  about conflicts.

(apb)

2015-03-21 15:30:11 UTC nick-nhusb commitmail json YAML

2015-03-21 15:29:38 UTC nick-nhusb commitmail json YAML

2015-03-21 15:28:10 UTC nick-nhusb commitmail json YAML

2015-03-21 13:58:31 UTC MAIN commitmail json YAML

No, PQ_ANON is set only if owned by anon, not if loaned to anon.

(riastradh)

2015-03-21 13:35:48 UTC MAIN commitmail json YAML

In a "native" build, this file is postprocessed by a perl script and some
lines are changed into either #define SOMETHING or #undef SOMETHING,
but in our in-tree build it is installed verbatim - so comment out all
#undef parts, to allow our makefile fragments to freely -DSOMETHING
and not have it silently canceld here.

(martin)

2015-03-21 13:28:32 UTC MAIN commitmail json YAML

Address O->A loan case in comments, pointed out by chs@.

(riastradh)

2015-03-21 13:11:14 UTC MAIN commitmail json YAML

Elaborate on locking scheme and vm_page states.

(riastradh)

2015-03-21 11:33:37 UTC nick-nhusb commitmail json YAML

2015-03-21 10:14:46 UTC nick-nhusb commitmail json YAML

2015-03-21 10:07:15 UTC nick-nhusb commitmail json YAML

Remove unnecessary attachment arg pointer dance.

(skrll)

2015-03-21 09:42:37 UTC nick-nhusb commitmail json YAML

Remove unnecessary attachment arg pointer dance.

(skrll)

2015-03-21 09:13:23 UTC nick-nhusb commitmail json YAML

2015-03-21 09:02:12 UTC netbsd-7 commitmail json YAML

2015-03-21 08:51:18 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by jmcneill in ticket #598):
sys/arch/arm/amlogic/amlogic_board.c: up to revision 1.9
    sys/arch/arm/amlogic/amlogic_canvasreg.h: revision 1.1
    sys/arch/arm/amlogic/amlogic_com.c: up to revision 1.4
    sys/arch/arm/amlogic/amlogic_comreg.h: up to revision 1.3
sys/arch/arm/amlogic/amlogic_comvar.h: revision 1.1
sys/arch/arm/amlogic/amlogic_cpufreq.c: up to revision 1.2
    sys/arch/arm/amlogic/amlogic_crureg.h: up to revision 1.7
    sys/arch/arm/amlogic/amlogic_dwctwo.c: up to revision 1.2
    sys/arch/arm/amlogic/amlogic_genfb.c: revision 1.1
sys/arch/arm/amlogic/amlogic_gmac.c: up to revision 1.2
sys/arch/arm/amlogic/amlogic_hdmireg.h: revision 1.1
    sys/arch/arm/amlogic/amlogic_intr.h: up to revision 1.5
    sys/arch/arm/amlogic/amlogic_io.c: up to revision 1.7
    sys/arch/arm/amlogic/amlogic_reg.h: up to revision 1.9
sys/arch/arm/amlogic/amlogic_rng.c: revision 1.1
    sys/arch/arm/amlogic/amlogic_sdhc.c: up to revision 1.3
    sys/arch/arm/amlogic/amlogic_sdhcreg.h: revision 1.1
    sys/arch/arm/amlogic/amlogic_space.c: revision 1.1
    sys/arch/arm/amlogic/amlogic_var.h: up to revision 1.8
    sys/arch/arm/amlogic/amlogic_vpureg.h: revision 1.1
sys/arch/arm/arm/bootconfig.c: revisions 1.7-1.8
sys/arch/arm/conf/files.arm: revision 1.129
sys/arch/arm/cortex/pl310.c: revisions 1.16-1.17
sys/arch/arm/cortex/a9_mpsubr.S: revisions 1.25-1.29
sys/arch/arm/cortex/a9tmr.c: revisions 1.8-1.12
sys/arch/arm/cortex/a9tmr_var.h: revision 1.4
sys/arch/arm/cortex/a9wdt.c: revisions 1.3-1.4
sys/arch/arm/cortex/armperiph.c: revisions 1.5-1.7
sys/arch/arm/arm/cpufunc.c: revision 1.151
sys/arch/arm/include/bootconfig.h: revision 1.7
sys/arch/arm/include/locore.h: revision 1.19
sys/arch/evbarm/amlogic/amlogic_machdep.c: up to revision 1.17
    sys/arch/evbarm/amlogic/amlogic_start.S: up to revision 1.2
    sys/arch/evbarm/amlogic/genassym.cf: revision 1.1
    sys/arch/evbarm/amlogic/platform.h: revision 1.1
    sys/arch/evbarm/conf/files.amlogic: up to revision 1.8
sys/arch/evbarm/conf/std.amlogic: up to revision 1.2
sys/arch/evbarm/conf/mk.amlogic: revision 1.1
    sys/arch/evbarm/conf/ODROID-C1: up to revision 1.12
    sys/arch/evarm/conf/ODROID-C1_INSTALL: revision 1.1
Don't use not as a variable since it's reserved in C++.
--
clean the a9 l2 cache before turning it on.
--
Add Cortex-A17 support
--
Fix CORTEXA17 support
--
Let the "cbar" device property override the cbar value, to work around
broken bootloaders
--
add a helper to update a9tmr frequency
--
detach and re-attach timecounter when updating freq, and reinit timer on
each cpu
--
fix typo
--
add BOOTOPT_TYPE_MACADDR for parsing mac address parameters
--
make sure we set ACTLR.SMP=1 for CPU_CORTEXA5 in !MP case, ok matt@
--
According to the Cortex-A5 TRM, the CBAR register is not implemented and
always reads as 0x00000000. Add ARM_CBAR option to set this in kernel
config.
--
skip a TLBIALL on Cortex-A5 that stops my odroid-c1 from booting, ok matt
--
match on Cortex-A5
--
match on Cortex-A5
--
allow arml2cc to be used on Cortex-A5 if the "offset" property is specified
--
print "A5" instead of "A9" at attach time if running on a Cortex-A5
--
Improve inline asm around dsb/dmb/isb:
- always use volatile and mark them as memory barrier
- use the common version from locore.h in all places not included from
  userland
--
Work-in-progress Odroid-C1 support.
--
no need to override ARM_CBAR, remove unused COM_16750 option
--
Add basic serial console support.
--
add dwctwo and usb devices
--
ODROID-C1 SMP support.
--
auto-detect RAM size
--
ODROID-C1 onboard ethernet support.
--
add amlogicrng, add commented-out genfb placeholder
--
enable amlogicsdhc
--
add ODROID-C1 install kernel
--
Add CPUFREQ option to set boot CPU frequency. ODROID-C1 is advertised
as quad-core 1.5GHz but boots up at 1.2GHz; add CPUFREQ=1512 to config
and make sure to set the correct speed before attaching CPUs.
The speed can still be scaled down with machdep.cpu sysctls.
--
disable DEBUG, LOCKDEBUG, VERBOSE_INIT_ARM
--
Basic framebuffer console support. Work in progress.

(snj)

2015-03-21 08:46:05 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by jmcneill in ticket #631):
sys/dev/wscons/wsconsio.h: revision 1.112 via patch
sys/dev/wsfb/genfb.c: revision 1.57
add WSDISPLAY_TYPE_MESON
--
support 24bpp framebuffers

(snj)

2015-03-21 08:35:31 UTC nick-nhusb commitmail json YAML

2015-03-21 05:50:19 UTC MAIN commitmail json YAML

one more white space -> tab.

(isaki)

2015-03-21 05:32:07 UTC MAIN commitmail json YAML

Rewrite ilog2's test.  PR lib/49745.
- Reorganize ilog2_basic to ilog2_32bit, ilog2_64bit and ilog2_const.
  ilog2_const is compile-time test for __builtin_constant_p() part of
  current ilog2() implementation.
- Remove fully meaningless ilog2_log2.  So this part of PR misc/44767
  is no longer present.

(isaki)

2015-03-21 01:17:00 UTC MAIN commitmail json YAML

2015-03-21 00:49:07 UTC MAIN commitmail json YAML

npfctl:
- Fix the filter criteria when to/from is omitted but port used.
- Print more user-friendly error if an NPF table has a duplicate entry.

(rmind)

2015-03-20 23:36:28 UTC MAIN commitmail json YAML

NPF: replace the TAILQ of the dynamic rules with a linked list and fix the
inheriting of the active dynamic rules during the reload; also, fix a bug
in the insert path by putting a memory barrier in the right place.

(rmind)

2015-03-20 21:55:46 UTC MAIN commitmail json YAML

support 24bpp framebuffers

(jmcneill)

2015-03-20 21:42:31 UTC MAIN commitmail json YAML

add WSDISPLAY_TYPE_MESON

(jmcneill)

2015-03-20 20:36:28 UTC MAIN commitmail json YAML

Zero-fill the ELF auxiliary vectors. Otherwise, on 64bit systems, the
padding between a_v and a_type contains kernel garbage, therefore
exposed to userland.

Original report by uebayasi@

(maxv)

2015-03-20 19:54:53 UTC MAIN commitmail json YAML

copyright maintenance, note shm@ in the manual and update the CHANGES
for recent changes.  call this 20150320.

(mrg)

2015-03-20 18:54:18 UTC MAIN commitmail json YAML

don't quote /.  it doesn't work.  this should fix PR#49765.

(mrg)

2015-03-20 15:41:44 UTC MAIN commitmail json YAML

Comments explaining UBC_* flags.

(riastradh)

2015-03-20 14:27:06 UTC MAIN commitmail json YAML

2015-03-20 14:26:42 UTC MAIN commitmail json YAML

Add MegaRAID SAS3108

(msaitoh)

2015-03-20 14:10:40 UTC MAIN commitmail json YAML

Tweak wording.

(riastradh)

2015-03-20 13:26:51 UTC MAIN commitmail json YAML

Elaborate on how our ad-hack symbol versioning works.  Tweak style.

(riastradh)

2015-03-20 12:57:48 UTC MAIN commitmail json YAML

First draft of documentation for the libc symbol madness.

Currently describes only what we do, not why we do it.

(riastradh)

2015-03-20 12:01:32 UTC MAIN commitmail json YAML

2015-03-20 11:45:49 UTC MAIN commitmail json YAML

2015-03-20 11:45:28 UTC MAIN commitmail json YAML

Add Xeon E5 v3 and C61x devices.

(msaitoh)

2015-03-20 08:32:27 UTC MAIN commitmail json YAML

2015-03-20 07:57:27 UTC MAIN commitmail json YAML

Trailing whitespace

(skrll)

2015-03-20 03:04:48 UTC MAIN commitmail json YAML

don't take the device lock when stopping the uhidev.  that calls
to abort and close pipes, both of which may take an adaptive lock.

fixes a LOCKDEBUG abort see on one particular machine.

(mrg)

2015-03-20 01:27:34 UTC MAIN commitmail json YAML

2015-03-20 01:20:16 UTC MAIN commitmail json YAML

fix copyright & license, make it explicit that this driver is based on
OpenBSD's ifb driver

(macallan)

2015-03-20 00:54:30 UTC MAIN commitmail json YAML

Not only check to see if we own the VFP but that the VFP is enabled.

(matt)

2015-03-19 22:57:45 UTC MAIN commitmail json YAML

These are expressions, not statements.  No semicolon.

(riastradh)

2015-03-19 21:22:59 UTC MAIN commitmail json YAML

2015-03-19 19:27:14 UTC MAIN commitmail json YAML

Build the AES sources with -fno-integrate-assembler for Clang.

(joerg)

2015-03-19 18:14:01 UTC netbsd-5-2 commitmail json YAML

Fix paths in previous.

(riz)

2015-03-19 18:13:25 UTC netbsd-5-1 commitmail json YAML

Fix paths in previous.

(riz)

2015-03-19 18:12:20 UTC netbsd-5 commitmail json YAML

Fix paths in previous.

(riz)

2015-03-19 17:26:43 UTC nick-nhusb commitmail json YAML

2015-03-19 17:16:22 UTC MAIN commitmail json YAML

Move initialization of XUIO_XUZC_PRIV out of #ifdef PORT_SOLARIS.

This code is not currently used, so no functional change, but it may
be used when we hook zfs into the ubc.

(riastradh)

2015-03-19 16:50:43 UTC netbsd-7 commitmail json YAML

2015-03-19 16:50:26 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #625):
crypto/external/bsd/openssl/dist/ssl/s2_lib.c: revision 1.3
crypto/external/bsd/openssl/dist/crypto/asn1/a_type.c: revision 1.2
crypto/external/bsd/openssl/dist/doc/crypto/d2i_X509.pod: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_lib.c: revision 1.2
crypto/external/bsd/openssl/dist/ssl/s2_srvr.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/asn1/tasn_dec.c: revision 1.2
patches for todays' OpenSSL security advisory from OpenSSL, as relevant
to NetBSD base:
OpenSSL Security Advisory [19 Mar 2015]
=======================================
Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
============================================================================
Severity: High
This security issue was previously announced by the OpenSSL project and
classified as "low" severity. This severity rating has now been changed to
"high".
This was classified low because it was originally thought that server RSA
export ciphersuite support was rare: a client was only vulnerable to a MITM
attack against a server which supports an RSA export ciphersuite. Recent
studies have shown that RSA export ciphersuites support is far more common.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
** issue already committed see last release **
OpenSSL 1.0.1 users should upgrade to 1.0.1k.
OpenSSL 1.0.0 users should upgrade to 1.0.0p.
OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
Henson of the OpenSSL core team. It was previously announced in the OpenSSL
security advisory on 8th January 2015.
Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
===================================================
Severity: Moderate
The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
certificate signature algorithm consistency this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 1b8ac2b07d02207f2b88e0b009b0bff4ef7eda96
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1e3ca524cb38ec92deea37629718e98aba43bc5d
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 7058bd1712828a78d34457b1cfc32bdc1e6d3d33
This issue was discovered and fixed by Stephen Henson of the OpenSSL
development team.
ASN.1 structure reuse memory corruption (CVE-2015-0287)
=======================================================
Severity: Moderate
Reusing a structure in ASN.1 parsing may allow an attacker to cause
memory corruption via an invalid write. Such reuse is and has been
strongly discouraged and is believed to be rare.
Applications that parse structures containing CHOICE or ANY DEFINED BY
components may be affected. Certificate parsing (d2i_X509 and related
functions) are however not affected. OpenSSL clients and servers are
not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 0ca8edbe6ec402e39c9e095f8ae11dba8fa93fc1
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a9f34a7aac5fd89f33a34fb71e954b85fbf35875
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit d96692c933fe02829c3e922bf7f239e0bd003759
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 5722767d5dc1a3b5505058fe27877fc993fe9a5a
This issue was discovered by Emilia K舖per and a fix developed by
Stephen Henson of the OpenSSL development team.
PKCS7 NULL pointer dereferences (CVE-2015-0289)
===============================================
Severity: Moderate
The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
missing content and trigger a NULL pointer dereference on parsing.
Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
otherwise parse PKCS#7 structures from untrusted sources are
affected. OpenSSL clients and servers are not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit e0d6a791c53b64da64277c5565eb89b1cb149fc3
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit d3d52c73544bba800c2a8f5ef3376358158cf2ca
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1f858109d0556b5864bb6a0aa3e2d177b1cc4552
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit f20caf7f66cb1eb9ba9562e6097bc7b64d207cb9
This issue was reported to OpenSSL on February 16th 2015 by Michal
Zalewski (Google) and a fix developed by Emilia K舖per of the OpenSSL
development team.
Base64 decode (CVE-2015-0292)
=============================
Severity: Moderate
A vulnerability existed in previous versions of OpenSSL related to the
processing of base64 encoded data. Any code path that reads base64 data from an
untrusted source could be affected (such as the PEM processing routines).
Maliciously crafted base 64 data could trigger a segmenation fault or memory
corruption. This was addressed in previous versions of OpenSSL but has not been
included in any security advisory until now.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.1 users should upgrade to 1.0.1h.
OpenSSL 1.0.0 users should upgrade to 1.0.0m.
OpenSSL 0.9.8 users should upgrade to 0.9.8za.
The fix for this issue can be identified by commits d0666f289a (1.0.1),
84fe686173 (1.0.0) and 9febee0272 (0.9.8). This issue was originally reported by
Robert Dugal and subsequently by David Ramos.
DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
=========================================================
Severity: Moderate
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
servers that both support SSLv2 and enable export cipher suites by sending
a specially crafted SSLv2 CLIENT-MASTER-KEY message.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit b29d57f20d4821a9d3f4e19673a89615e4c6fcf0
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a40c1bcb8c37fbad24d8f28f0fb0204d76f0fee2
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit ee4435e5b587879e7bd66df10d4d9ec274e2b163
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit ab646ee5a6a7b8cace425a617a053ad6d7977086
This issue was discovered by Sean Burford (Google) and Emilia K舖per
(OpenSSL development team) in March 2015 and the fix was developed by
Emilia K舖per.
Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
===============================================================
Severity: Low
A malformed EC private key file consumed via the d2i_ECPrivateKey function could
cause a use after free condition. This, in turn, could cause a double
free in several private key parsing functions (such as d2i_PrivateKey
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
for applications that receive EC private keys from untrusted
sources. This scenario is considered rare.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://github.com/openssl/openssl/commit/1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
This issue was discovered by the BoringSSL project and fixed in their commit
517073cd4b. The OpenSSL fix was developed by Matt Caswell of the OpenSSL
development team.
X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
===================================================
Severity: Low
The function X509_to_X509_REQ will crash with a NULL pointer dereference if
the certificate key is invalid. This function is rarely used in practice.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9
This issue was discovered by Brian Carpenter and a fix developed by Stephen
Henson of the OpenSSL development team.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150319.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

(riz)

2015-03-19 16:47:41 UTC netbsd-6-1 commitmail json YAML

2015-03-19 16:47:14 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1281):
crypto/external/bsd/openssl/dist/ssl/s2_lib.c: revision 1.3
crypto/external/bsd/openssl/dist/crypto/asn1/a_type.c: revision 1.2
crypto/external/bsd/openssl/dist/doc/crypto/d2i_X509.pod: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_lib.c: revision 1.2
crypto/external/bsd/openssl/dist/ssl/s2_srvr.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/asn1/tasn_dec.c: revision 1.2
patches for todays' OpenSSL security advisory from OpenSSL, as relevant
to NetBSD base:
OpenSSL Security Advisory [19 Mar 2015]
=======================================
Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
============================================================================
Severity: High
This security issue was previously announced by the OpenSSL project and
classified as "low" severity. This severity rating has now been changed to
"high".
This was classified low because it was originally thought that server RSA
export ciphersuite support was rare: a client was only vulnerable to a MITM
attack against a server which supports an RSA export ciphersuite. Recent
studies have shown that RSA export ciphersuites support is far more common.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
** issue already committed see last release **
OpenSSL 1.0.1 users should upgrade to 1.0.1k.
OpenSSL 1.0.0 users should upgrade to 1.0.0p.
OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
Henson of the OpenSSL core team. It was previously announced in the OpenSSL
security advisory on 8th January 2015.
Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
===================================================
Severity: Moderate
The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
certificate signature algorithm consistency this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 1b8ac2b07d02207f2b88e0b009b0bff4ef7eda96
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1e3ca524cb38ec92deea37629718e98aba43bc5d
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 7058bd1712828a78d34457b1cfc32bdc1e6d3d33
This issue was discovered and fixed by Stephen Henson of the OpenSSL
development team.
ASN.1 structure reuse memory corruption (CVE-2015-0287)
=======================================================
Severity: Moderate
Reusing a structure in ASN.1 parsing may allow an attacker to cause
memory corruption via an invalid write. Such reuse is and has been
strongly discouraged and is believed to be rare.
Applications that parse structures containing CHOICE or ANY DEFINED BY
components may be affected. Certificate parsing (d2i_X509 and related
functions) are however not affected. OpenSSL clients and servers are
not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 0ca8edbe6ec402e39c9e095f8ae11dba8fa93fc1
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a9f34a7aac5fd89f33a34fb71e954b85fbf35875
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit d96692c933fe02829c3e922bf7f239e0bd003759
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 5722767d5dc1a3b5505058fe27877fc993fe9a5a
This issue was discovered by Emilia K舖per and a fix developed by
Stephen Henson of the OpenSSL development team.
PKCS7 NULL pointer dereferences (CVE-2015-0289)
===============================================
Severity: Moderate
The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
missing content and trigger a NULL pointer dereference on parsing.
Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
otherwise parse PKCS#7 structures from untrusted sources are
affected. OpenSSL clients and servers are not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit e0d6a791c53b64da64277c5565eb89b1cb149fc3
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit d3d52c73544bba800c2a8f5ef3376358158cf2ca
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1f858109d0556b5864bb6a0aa3e2d177b1cc4552
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit f20caf7f66cb1eb9ba9562e6097bc7b64d207cb9
This issue was reported to OpenSSL on February 16th 2015 by Michal
Zalewski (Google) and a fix developed by Emilia K舖per of the OpenSSL
development team.
Base64 decode (CVE-2015-0292)
=============================
Severity: Moderate
A vulnerability existed in previous versions of OpenSSL related to the
processing of base64 encoded data. Any code path that reads base64 data from an
untrusted source could be affected (such as the PEM processing routines).
Maliciously crafted base 64 data could trigger a segmenation fault or memory
corruption. This was addressed in previous versions of OpenSSL but has not been
included in any security advisory until now.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.1 users should upgrade to 1.0.1h.
OpenSSL 1.0.0 users should upgrade to 1.0.0m.
OpenSSL 0.9.8 users should upgrade to 0.9.8za.
The fix for this issue can be identified by commits d0666f289a (1.0.1),
84fe686173 (1.0.0) and 9febee0272 (0.9.8). This issue was originally reported by
Robert Dugal and subsequently by David Ramos.
DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
=========================================================
Severity: Moderate
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
servers that both support SSLv2 and enable export cipher suites by sending
a specially crafted SSLv2 CLIENT-MASTER-KEY message.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit b29d57f20d4821a9d3f4e19673a89615e4c6fcf0
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a40c1bcb8c37fbad24d8f28f0fb0204d76f0fee2
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit ee4435e5b587879e7bd66df10d4d9ec274e2b163
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit ab646ee5a6a7b8cace425a617a053ad6d7977086
This issue was discovered by Sean Burford (Google) and Emilia K舖per
(OpenSSL development team) in March 2015 and the fix was developed by
Emilia K舖per.
Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
===============================================================
Severity: Low
A malformed EC private key file consumed via the d2i_ECPrivateKey function could
cause a use after free condition. This, in turn, could cause a double
free in several private key parsing functions (such as d2i_PrivateKey
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
for applications that receive EC private keys from untrusted
sources. This scenario is considered rare.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://github.com/openssl/openssl/commit/1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
This issue was discovered by the BoringSSL project and fixed in their commit
517073cd4b. The OpenSSL fix was developed by Matt Caswell of the OpenSSL
development team.
X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
===================================================
Severity: Low
The function X509_to_X509_REQ will crash with a NULL pointer dereference if
the certificate key is invalid. This function is rarely used in practice.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9
This issue was discovered by Brian Carpenter and a fix developed by Stephen
Henson of the OpenSSL development team.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150319.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

(riz)

2015-03-19 16:46:42 UTC netbsd-6-0 commitmail json YAML

2015-03-19 16:46:24 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1281):
crypto/external/bsd/openssl/dist/ssl/s2_lib.c: revision 1.3
crypto/external/bsd/openssl/dist/crypto/asn1/a_type.c: revision 1.2
crypto/external/bsd/openssl/dist/doc/crypto/d2i_X509.pod: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_lib.c: revision 1.2
crypto/external/bsd/openssl/dist/ssl/s2_srvr.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/asn1/tasn_dec.c: revision 1.2
patches for todays' OpenSSL security advisory from OpenSSL, as relevant
to NetBSD base:
OpenSSL Security Advisory [19 Mar 2015]
=======================================
Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
============================================================================
Severity: High
This security issue was previously announced by the OpenSSL project and
classified as "low" severity. This severity rating has now been changed to
"high".
This was classified low because it was originally thought that server RSA
export ciphersuite support was rare: a client was only vulnerable to a MITM
attack against a server which supports an RSA export ciphersuite. Recent
studies have shown that RSA export ciphersuites support is far more common.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
** issue already committed see last release **
OpenSSL 1.0.1 users should upgrade to 1.0.1k.
OpenSSL 1.0.0 users should upgrade to 1.0.0p.
OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
Henson of the OpenSSL core team. It was previously announced in the OpenSSL
security advisory on 8th January 2015.
Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
===================================================
Severity: Moderate
The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
certificate signature algorithm consistency this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 1b8ac2b07d02207f2b88e0b009b0bff4ef7eda96
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1e3ca524cb38ec92deea37629718e98aba43bc5d
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 7058bd1712828a78d34457b1cfc32bdc1e6d3d33
This issue was discovered and fixed by Stephen Henson of the OpenSSL
development team.
ASN.1 structure reuse memory corruption (CVE-2015-0287)
=======================================================
Severity: Moderate
Reusing a structure in ASN.1 parsing may allow an attacker to cause
memory corruption via an invalid write. Such reuse is and has been
strongly discouraged and is believed to be rare.
Applications that parse structures containing CHOICE or ANY DEFINED BY
components may be affected. Certificate parsing (d2i_X509 and related
functions) are however not affected. OpenSSL clients and servers are
not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 0ca8edbe6ec402e39c9e095f8ae11dba8fa93fc1
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a9f34a7aac5fd89f33a34fb71e954b85fbf35875
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit d96692c933fe02829c3e922bf7f239e0bd003759
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 5722767d5dc1a3b5505058fe27877fc993fe9a5a
This issue was discovered by Emilia K舖per and a fix developed by
Stephen Henson of the OpenSSL development team.
PKCS7 NULL pointer dereferences (CVE-2015-0289)
===============================================
Severity: Moderate
The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
missing content and trigger a NULL pointer dereference on parsing.
Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
otherwise parse PKCS#7 structures from untrusted sources are
affected. OpenSSL clients and servers are not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit e0d6a791c53b64da64277c5565eb89b1cb149fc3
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit d3d52c73544bba800c2a8f5ef3376358158cf2ca
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1f858109d0556b5864bb6a0aa3e2d177b1cc4552
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit f20caf7f66cb1eb9ba9562e6097bc7b64d207cb9
This issue was reported to OpenSSL on February 16th 2015 by Michal
Zalewski (Google) and a fix developed by Emilia K舖per of the OpenSSL
development team.
Base64 decode (CVE-2015-0292)
=============================
Severity: Moderate
A vulnerability existed in previous versions of OpenSSL related to the
processing of base64 encoded data. Any code path that reads base64 data from an
untrusted source could be affected (such as the PEM processing routines).
Maliciously crafted base 64 data could trigger a segmenation fault or memory
corruption. This was addressed in previous versions of OpenSSL but has not been
included in any security advisory until now.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.1 users should upgrade to 1.0.1h.
OpenSSL 1.0.0 users should upgrade to 1.0.0m.
OpenSSL 0.9.8 users should upgrade to 0.9.8za.
The fix for this issue can be identified by commits d0666f289a (1.0.1),
84fe686173 (1.0.0) and 9febee0272 (0.9.8). This issue was originally reported by
Robert Dugal and subsequently by David Ramos.
DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
=========================================================
Severity: Moderate
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
servers that both support SSLv2 and enable export cipher suites by sending
a specially crafted SSLv2 CLIENT-MASTER-KEY message.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit b29d57f20d4821a9d3f4e19673a89615e4c6fcf0
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a40c1bcb8c37fbad24d8f28f0fb0204d76f0fee2
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit ee4435e5b587879e7bd66df10d4d9ec274e2b163
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit ab646ee5a6a7b8cace425a617a053ad6d7977086
This issue was discovered by Sean Burford (Google) and Emilia K舖per
(OpenSSL development team) in March 2015 and the fix was developed by
Emilia K舖per.
Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
===============================================================
Severity: Low
A malformed EC private key file consumed via the d2i_ECPrivateKey function could
cause a use after free condition. This, in turn, could cause a double
free in several private key parsing functions (such as d2i_PrivateKey
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
for applications that receive EC private keys from untrusted
sources. This scenario is considered rare.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://github.com/openssl/openssl/commit/1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
This issue was discovered by the BoringSSL project and fixed in their commit
517073cd4b. The OpenSSL fix was developed by Matt Caswell of the OpenSSL
development team.
X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
===================================================
Severity: Low
The function X509_to_X509_REQ will crash with a NULL pointer dereference if
the certificate key is invalid. This function is rarely used in practice.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9
This issue was discovered by Brian Carpenter and a fix developed by Stephen
Henson of the OpenSSL development team.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150319.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

(riz)

2015-03-19 16:46:02 UTC netbsd-6 commitmail json YAML

2015-03-19 16:45:35 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1281):
crypto/external/bsd/openssl/dist/ssl/s2_lib.c: revision 1.3
crypto/external/bsd/openssl/dist/crypto/asn1/a_type.c: revision 1.2
crypto/external/bsd/openssl/dist/doc/crypto/d2i_X509.pod: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_lib.c: revision 1.2
crypto/external/bsd/openssl/dist/ssl/s2_srvr.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/asn1/tasn_dec.c: revision 1.2
patches for todays' OpenSSL security advisory from OpenSSL, as relevant
to NetBSD base:
OpenSSL Security Advisory [19 Mar 2015]
=======================================
Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
============================================================================
Severity: High
This security issue was previously announced by the OpenSSL project and
classified as "low" severity. This severity rating has now been changed to
"high".
This was classified low because it was originally thought that server RSA
export ciphersuite support was rare: a client was only vulnerable to a MITM
attack against a server which supports an RSA export ciphersuite. Recent
studies have shown that RSA export ciphersuites support is far more common.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
** issue already committed see last release **
OpenSSL 1.0.1 users should upgrade to 1.0.1k.
OpenSSL 1.0.0 users should upgrade to 1.0.0p.
OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
Henson of the OpenSSL core team. It was previously announced in the OpenSSL
security advisory on 8th January 2015.
Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
===================================================
Severity: Moderate
The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
certificate signature algorithm consistency this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 1b8ac2b07d02207f2b88e0b009b0bff4ef7eda96
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1e3ca524cb38ec92deea37629718e98aba43bc5d
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 7058bd1712828a78d34457b1cfc32bdc1e6d3d33
This issue was discovered and fixed by Stephen Henson of the OpenSSL
development team.
ASN.1 structure reuse memory corruption (CVE-2015-0287)
=======================================================
Severity: Moderate
Reusing a structure in ASN.1 parsing may allow an attacker to cause
memory corruption via an invalid write. Such reuse is and has been
strongly discouraged and is believed to be rare.
Applications that parse structures containing CHOICE or ANY DEFINED BY
components may be affected. Certificate parsing (d2i_X509 and related
functions) are however not affected. OpenSSL clients and servers are
not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 0ca8edbe6ec402e39c9e095f8ae11dba8fa93fc1
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a9f34a7aac5fd89f33a34fb71e954b85fbf35875
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit d96692c933fe02829c3e922bf7f239e0bd003759
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 5722767d5dc1a3b5505058fe27877fc993fe9a5a
This issue was discovered by Emilia K舖per and a fix developed by
Stephen Henson of the OpenSSL development team.
PKCS7 NULL pointer dereferences (CVE-2015-0289)
===============================================
Severity: Moderate
The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
missing content and trigger a NULL pointer dereference on parsing.
Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
otherwise parse PKCS#7 structures from untrusted sources are
affected. OpenSSL clients and servers are not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit e0d6a791c53b64da64277c5565eb89b1cb149fc3
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit d3d52c73544bba800c2a8f5ef3376358158cf2ca
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1f858109d0556b5864bb6a0aa3e2d177b1cc4552
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit f20caf7f66cb1eb9ba9562e6097bc7b64d207cb9
This issue was reported to OpenSSL on February 16th 2015 by Michal
Zalewski (Google) and a fix developed by Emilia K舖per of the OpenSSL
development team.
Base64 decode (CVE-2015-0292)
=============================
Severity: Moderate
A vulnerability existed in previous versions of OpenSSL related to the
processing of base64 encoded data. Any code path that reads base64 data from an
untrusted source could be affected (such as the PEM processing routines).
Maliciously crafted base 64 data could trigger a segmenation fault or memory
corruption. This was addressed in previous versions of OpenSSL but has not been
included in any security advisory until now.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.1 users should upgrade to 1.0.1h.
OpenSSL 1.0.0 users should upgrade to 1.0.0m.
OpenSSL 0.9.8 users should upgrade to 0.9.8za.
The fix for this issue can be identified by commits d0666f289a (1.0.1),
84fe686173 (1.0.0) and 9febee0272 (0.9.8). This issue was originally reported by
Robert Dugal and subsequently by David Ramos.
DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
=========================================================
Severity: Moderate
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
servers that both support SSLv2 and enable export cipher suites by sending
a specially crafted SSLv2 CLIENT-MASTER-KEY message.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit b29d57f20d4821a9d3f4e19673a89615e4c6fcf0
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a40c1bcb8c37fbad24d8f28f0fb0204d76f0fee2
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit ee4435e5b587879e7bd66df10d4d9ec274e2b163
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit ab646ee5a6a7b8cace425a617a053ad6d7977086
This issue was discovered by Sean Burford (Google) and Emilia K舖per
(OpenSSL development team) in March 2015 and the fix was developed by
Emilia K舖per.
Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
===============================================================
Severity: Low
A malformed EC private key file consumed via the d2i_ECPrivateKey function could
cause a use after free condition. This, in turn, could cause a double
free in several private key parsing functions (such as d2i_PrivateKey
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
for applications that receive EC private keys from untrusted
sources. This scenario is considered rare.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://github.com/openssl/openssl/commit/1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
This issue was discovered by the BoringSSL project and fixed in their commit
517073cd4b. The OpenSSL fix was developed by Matt Caswell of the OpenSSL
development team.
X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
===================================================
Severity: Low
The function X509_to_X509_REQ will crash with a NULL pointer dereference if
the certificate key is invalid. This function is rarely used in practice.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9
This issue was discovered by Brian Carpenter and a fix developed by Stephen
Henson of the OpenSSL development team.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150319.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

(riz)

2015-03-19 16:41:13 UTC netbsd-5-2 commitmail json YAML

2015-03-19 16:40:51 UTC netbsd-5-2 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1954):
crypto/external/bsd/openssl/dist/ssl/s2_lib.c: revision 1.3
crypto/external/bsd/openssl/dist/crypto/asn1/a_type.c: revision 1.2
crypto/external/bsd/openssl/dist/doc/crypto/d2i_X509.pod: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_lib.c: revision 1.2
crypto/external/bsd/openssl/dist/ssl/s2_srvr.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/asn1/tasn_dec.c: revision 1.2
patches for todays' OpenSSL security advisory from OpenSSL, as relevant
to NetBSD base:
OpenSSL Security Advisory [19 Mar 2015]
=======================================
Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
============================================================================
Severity: High
This security issue was previously announced by the OpenSSL project and
classified as "low" severity. This severity rating has now been changed to
"high".
This was classified low because it was originally thought that server RSA
export ciphersuite support was rare: a client was only vulnerable to a MITM
attack against a server which supports an RSA export ciphersuite. Recent
studies have shown that RSA export ciphersuites support is far more common.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
** issue already committed see last release **
OpenSSL 1.0.1 users should upgrade to 1.0.1k.
OpenSSL 1.0.0 users should upgrade to 1.0.0p.
OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
Henson of the OpenSSL core team. It was previously announced in the OpenSSL
security advisory on 8th January 2015.
Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
===================================================
Severity: Moderate
The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
certificate signature algorithm consistency this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 1b8ac2b07d02207f2b88e0b009b0bff4ef7eda96
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1e3ca524cb38ec92deea37629718e98aba43bc5d
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 7058bd1712828a78d34457b1cfc32bdc1e6d3d33
This issue was discovered and fixed by Stephen Henson of the OpenSSL
development team.
ASN.1 structure reuse memory corruption (CVE-2015-0287)
=======================================================
Severity: Moderate
Reusing a structure in ASN.1 parsing may allow an attacker to cause
memory corruption via an invalid write. Such reuse is and has been
strongly discouraged and is believed to be rare.
Applications that parse structures containing CHOICE or ANY DEFINED BY
components may be affected. Certificate parsing (d2i_X509 and related
functions) are however not affected. OpenSSL clients and servers are
not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 0ca8edbe6ec402e39c9e095f8ae11dba8fa93fc1
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a9f34a7aac5fd89f33a34fb71e954b85fbf35875
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit d96692c933fe02829c3e922bf7f239e0bd003759
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 5722767d5dc1a3b5505058fe27877fc993fe9a5a
This issue was discovered by Emilia K舖per and a fix developed by
Stephen Henson of the OpenSSL development team.
PKCS7 NULL pointer dereferences (CVE-2015-0289)
===============================================
Severity: Moderate
The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
missing content and trigger a NULL pointer dereference on parsing.
Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
otherwise parse PKCS#7 structures from untrusted sources are
affected. OpenSSL clients and servers are not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit e0d6a791c53b64da64277c5565eb89b1cb149fc3
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit d3d52c73544bba800c2a8f5ef3376358158cf2ca
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1f858109d0556b5864bb6a0aa3e2d177b1cc4552
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit f20caf7f66cb1eb9ba9562e6097bc7b64d207cb9
This issue was reported to OpenSSL on February 16th 2015 by Michal
Zalewski (Google) and a fix developed by Emilia K舖per of the OpenSSL
development team.
Base64 decode (CVE-2015-0292)
=============================
Severity: Moderate
A vulnerability existed in previous versions of OpenSSL related to the
processing of base64 encoded data. Any code path that reads base64 data from an
untrusted source could be affected (such as the PEM processing routines).
Maliciously crafted base 64 data could trigger a segmenation fault or memory
corruption. This was addressed in previous versions of OpenSSL but has not been
included in any security advisory until now.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.1 users should upgrade to 1.0.1h.
OpenSSL 1.0.0 users should upgrade to 1.0.0m.
OpenSSL 0.9.8 users should upgrade to 0.9.8za.
The fix for this issue can be identified by commits d0666f289a (1.0.1),
84fe686173 (1.0.0) and 9febee0272 (0.9.8). This issue was originally reported by
Robert Dugal and subsequently by David Ramos.
DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
=========================================================
Severity: Moderate
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
servers that both support SSLv2 and enable export cipher suites by sending
a specially crafted SSLv2 CLIENT-MASTER-KEY message.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit b29d57f20d4821a9d3f4e19673a89615e4c6fcf0
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a40c1bcb8c37fbad24d8f28f0fb0204d76f0fee2
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit ee4435e5b587879e7bd66df10d4d9ec274e2b163
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit ab646ee5a6a7b8cace425a617a053ad6d7977086
This issue was discovered by Sean Burford (Google) and Emilia K舖per
(OpenSSL development team) in March 2015 and the fix was developed by
Emilia K舖per.
Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
===============================================================
Severity: Low
A malformed EC private key file consumed via the d2i_ECPrivateKey function could
cause a use after free condition. This, in turn, could cause a double
free in several private key parsing functions (such as d2i_PrivateKey
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
for applications that receive EC private keys from untrusted
sources. This scenario is considered rare.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://github.com/openssl/openssl/commit/1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
This issue was discovered by the BoringSSL project and fixed in their commit
517073cd4b. The OpenSSL fix was developed by Matt Caswell of the OpenSSL
development team.
X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
===================================================
Severity: Low
The function X509_to_X509_REQ will crash with a NULL pointer dereference if
the certificate key is invalid. This function is rarely used in practice.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9
This issue was discovered by Brian Carpenter and a fix developed by Stephen
Henson of the OpenSSL development team.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150319.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

(riz)

2015-03-19 16:40:32 UTC netbsd-5-1 commitmail json YAML

2015-03-19 16:40:07 UTC netbsd-5-1 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1954):
crypto/external/bsd/openssl/dist/ssl/s2_lib.c: revision 1.3
crypto/external/bsd/openssl/dist/crypto/asn1/a_type.c: revision 1.2
crypto/external/bsd/openssl/dist/doc/crypto/d2i_X509.pod: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_lib.c: revision 1.2
crypto/external/bsd/openssl/dist/ssl/s2_srvr.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/asn1/tasn_dec.c: revision 1.2
patches for todays' OpenSSL security advisory from OpenSSL, as relevant
to NetBSD base:
OpenSSL Security Advisory [19 Mar 2015]
=======================================
Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
============================================================================
Severity: High
This security issue was previously announced by the OpenSSL project and
classified as "low" severity. This severity rating has now been changed to
"high".
This was classified low because it was originally thought that server RSA
export ciphersuite support was rare: a client was only vulnerable to a MITM
attack against a server which supports an RSA export ciphersuite. Recent
studies have shown that RSA export ciphersuites support is far more common.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
** issue already committed see last release **
OpenSSL 1.0.1 users should upgrade to 1.0.1k.
OpenSSL 1.0.0 users should upgrade to 1.0.0p.
OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
Henson of the OpenSSL core team. It was previously announced in the OpenSSL
security advisory on 8th January 2015.
Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
===================================================
Severity: Moderate
The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
certificate signature algorithm consistency this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 1b8ac2b07d02207f2b88e0b009b0bff4ef7eda96
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1e3ca524cb38ec92deea37629718e98aba43bc5d
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 7058bd1712828a78d34457b1cfc32bdc1e6d3d33
This issue was discovered and fixed by Stephen Henson of the OpenSSL
development team.
ASN.1 structure reuse memory corruption (CVE-2015-0287)
=======================================================
Severity: Moderate
Reusing a structure in ASN.1 parsing may allow an attacker to cause
memory corruption via an invalid write. Such reuse is and has been
strongly discouraged and is believed to be rare.
Applications that parse structures containing CHOICE or ANY DEFINED BY
components may be affected. Certificate parsing (d2i_X509 and related
functions) are however not affected. OpenSSL clients and servers are
not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 0ca8edbe6ec402e39c9e095f8ae11dba8fa93fc1
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a9f34a7aac5fd89f33a34fb71e954b85fbf35875
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit d96692c933fe02829c3e922bf7f239e0bd003759
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 5722767d5dc1a3b5505058fe27877fc993fe9a5a
This issue was discovered by Emilia K舖per and a fix developed by
Stephen Henson of the OpenSSL development team.
PKCS7 NULL pointer dereferences (CVE-2015-0289)
===============================================
Severity: Moderate
The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
missing content and trigger a NULL pointer dereference on parsing.
Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
otherwise parse PKCS#7 structures from untrusted sources are
affected. OpenSSL clients and servers are not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit e0d6a791c53b64da64277c5565eb89b1cb149fc3
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit d3d52c73544bba800c2a8f5ef3376358158cf2ca
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1f858109d0556b5864bb6a0aa3e2d177b1cc4552
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit f20caf7f66cb1eb9ba9562e6097bc7b64d207cb9
This issue was reported to OpenSSL on February 16th 2015 by Michal
Zalewski (Google) and a fix developed by Emilia K舖per of the OpenSSL
development team.
Base64 decode (CVE-2015-0292)
=============================
Severity: Moderate
A vulnerability existed in previous versions of OpenSSL related to the
processing of base64 encoded data. Any code path that reads base64 data from an
untrusted source could be affected (such as the PEM processing routines).
Maliciously crafted base 64 data could trigger a segmenation fault or memory
corruption. This was addressed in previous versions of OpenSSL but has not been
included in any security advisory until now.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.1 users should upgrade to 1.0.1h.
OpenSSL 1.0.0 users should upgrade to 1.0.0m.
OpenSSL 0.9.8 users should upgrade to 0.9.8za.
The fix for this issue can be identified by commits d0666f289a (1.0.1),
84fe686173 (1.0.0) and 9febee0272 (0.9.8). This issue was originally reported by
Robert Dugal and subsequently by David Ramos.
DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
=========================================================
Severity: Moderate
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
servers that both support SSLv2 and enable export cipher suites by sending
a specially crafted SSLv2 CLIENT-MASTER-KEY message.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit b29d57f20d4821a9d3f4e19673a89615e4c6fcf0
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a40c1bcb8c37fbad24d8f28f0fb0204d76f0fee2
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit ee4435e5b587879e7bd66df10d4d9ec274e2b163
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit ab646ee5a6a7b8cace425a617a053ad6d7977086
This issue was discovered by Sean Burford (Google) and Emilia K舖per
(OpenSSL development team) in March 2015 and the fix was developed by
Emilia K舖per.
Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
===============================================================
Severity: Low
A malformed EC private key file consumed via the d2i_ECPrivateKey function could
cause a use after free condition. This, in turn, could cause a double
free in several private key parsing functions (such as d2i_PrivateKey
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
for applications that receive EC private keys from untrusted
sources. This scenario is considered rare.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://github.com/openssl/openssl/commit/1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
This issue was discovered by the BoringSSL project and fixed in their commit
517073cd4b. The OpenSSL fix was developed by Matt Caswell of the OpenSSL
development team.
X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
===================================================
Severity: Low
The function X509_to_X509_REQ will crash with a NULL pointer dereference if
the certificate key is invalid. This function is rarely used in practice.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9
This issue was discovered by Brian Carpenter and a fix developed by Stephen
Henson of the OpenSSL development team.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150319.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

(riz)

2015-03-19 16:39:50 UTC netbsd-5 commitmail json YAML

2015-03-19 16:39:09 UTC netbsd-5 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1954):
crypto/external/bsd/openssl/dist/ssl/s2_lib.c: revision 1.3
crypto/external/bsd/openssl/dist/crypto/asn1/a_type.c: revision 1.2
crypto/external/bsd/openssl/dist/doc/crypto/d2i_X509.pod: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_lib.c: revision 1.2
crypto/external/bsd/openssl/dist/ssl/s2_srvr.c: revision 1.2
crypto/external/bsd/openssl/dist/crypto/asn1/tasn_dec.c: revision 1.2
patches for todays' OpenSSL security advisory from OpenSSL, as relevant
to NetBSD base:
OpenSSL Security Advisory [19 Mar 2015]
=======================================
Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
============================================================================
Severity: High
This security issue was previously announced by the OpenSSL project and
classified as "low" severity. This severity rating has now been changed to
"high".
This was classified low because it was originally thought that server RSA
export ciphersuite support was rare: a client was only vulnerable to a MITM
attack against a server which supports an RSA export ciphersuite. Recent
studies have shown that RSA export ciphersuites support is far more common.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
** issue already committed see last release **
OpenSSL 1.0.1 users should upgrade to 1.0.1k.
OpenSSL 1.0.0 users should upgrade to 1.0.0p.
OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
Henson of the OpenSSL core team. It was previously announced in the OpenSSL
security advisory on 8th January 2015.
Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
===================================================
Severity: Moderate
The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
certificate signature algorithm consistency this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 1b8ac2b07d02207f2b88e0b009b0bff4ef7eda96
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1e3ca524cb38ec92deea37629718e98aba43bc5d
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 7058bd1712828a78d34457b1cfc32bdc1e6d3d33
This issue was discovered and fixed by Stephen Henson of the OpenSSL
development team.
ASN.1 structure reuse memory corruption (CVE-2015-0287)
=======================================================
Severity: Moderate
Reusing a structure in ASN.1 parsing may allow an attacker to cause
memory corruption via an invalid write. Such reuse is and has been
strongly discouraged and is believed to be rare.
Applications that parse structures containing CHOICE or ANY DEFINED BY
components may be affected. Certificate parsing (d2i_X509 and related
functions) are however not affected. OpenSSL clients and servers are
not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 0ca8edbe6ec402e39c9e095f8ae11dba8fa93fc1
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a9f34a7aac5fd89f33a34fb71e954b85fbf35875
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit d96692c933fe02829c3e922bf7f239e0bd003759
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 5722767d5dc1a3b5505058fe27877fc993fe9a5a
This issue was discovered by Emilia K舖per and a fix developed by
Stephen Henson of the OpenSSL development team.
PKCS7 NULL pointer dereferences (CVE-2015-0289)
===============================================
Severity: Moderate
The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
missing content and trigger a NULL pointer dereference on parsing.
Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
otherwise parse PKCS#7 structures from untrusted sources are
affected. OpenSSL clients and servers are not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit e0d6a791c53b64da64277c5565eb89b1cb149fc3
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit d3d52c73544bba800c2a8f5ef3376358158cf2ca
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1f858109d0556b5864bb6a0aa3e2d177b1cc4552
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit f20caf7f66cb1eb9ba9562e6097bc7b64d207cb9
This issue was reported to OpenSSL on February 16th 2015 by Michal
Zalewski (Google) and a fix developed by Emilia K舖per of the OpenSSL
development team.
Base64 decode (CVE-2015-0292)
=============================
Severity: Moderate
A vulnerability existed in previous versions of OpenSSL related to the
processing of base64 encoded data. Any code path that reads base64 data from an
untrusted source could be affected (such as the PEM processing routines).
Maliciously crafted base 64 data could trigger a segmenation fault or memory
corruption. This was addressed in previous versions of OpenSSL but has not been
included in any security advisory until now.
This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.1 users should upgrade to 1.0.1h.
OpenSSL 1.0.0 users should upgrade to 1.0.0m.
OpenSSL 0.9.8 users should upgrade to 0.9.8za.
The fix for this issue can be identified by commits d0666f289a (1.0.1),
84fe686173 (1.0.0) and 9febee0272 (0.9.8). This issue was originally reported by
Robert Dugal and subsequently by David Ramos.
DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
=========================================================
Severity: Moderate
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
servers that both support SSLv2 and enable export cipher suites by sending
a specially crafted SSLv2 CLIENT-MASTER-KEY message.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit b29d57f20d4821a9d3f4e19673a89615e4c6fcf0
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a40c1bcb8c37fbad24d8f28f0fb0204d76f0fee2
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit ee4435e5b587879e7bd66df10d4d9ec274e2b163
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit ab646ee5a6a7b8cace425a617a053ad6d7977086
This issue was discovered by Sean Burford (Google) and Emilia K舖per
(OpenSSL development team) in March 2015 and the fix was developed by
Emilia K舖per.
Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
===============================================================
Severity: Low
A malformed EC private key file consumed via the d2i_ECPrivateKey function could
cause a use after free condition. This, in turn, could cause a double
free in several private key parsing functions (such as d2i_PrivateKey
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
for applications that receive EC private keys from untrusted
sources. This scenario is considered rare.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://github.com/openssl/openssl/commit/1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
This issue was discovered by the BoringSSL project and fixed in their commit
517073cd4b. The OpenSSL fix was developed by Matt Caswell of the OpenSSL
development team.
X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
===================================================
Severity: Low
The function X509_to_X509_REQ will crash with a NULL pointer dereference if
the certificate key is invalid. This function is rarely used in practice.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.
** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9
This issue was discovered by Brian Carpenter and a fix developed by Stephen
Henson of the OpenSSL development team.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150319.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

(riz)

2015-03-19 14:24:55 UTC MAIN commitmail json YAML

patches for todays' OpenSSL security advisory from OpenSSL, as relevant
to NetBSD base:

OpenSSL Security Advisory [19 Mar 2015]
=======================================

Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
============================================================================

Severity: High

This security issue was previously announced by the OpenSSL project and
classified as "low" severity. This severity rating has now been changed to
"high".

This was classified low because it was originally thought that server RSA
export ciphersuite support was rare: a client was only vulnerable to a MITM
attack against a server which supports an RSA export ciphersuite. Recent
studies have shown that RSA export ciphersuites support is far more common.

This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.

** issue already committed see last release **
OpenSSL 1.0.1 users should upgrade to 1.0.1k.
OpenSSL 1.0.0 users should upgrade to 1.0.0p.
OpenSSL 0.9.8 users should upgrade to 0.9.8zd.

This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
Henson of the OpenSSL core team. It was previously announced in the OpenSSL
security advisory on 8th January 2015.

Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
===================================================

Severity: Moderate

The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
certificate signature algorithm consistency this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 1b8ac2b07d02207f2b88e0b009b0bff4ef7eda96

OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8

OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1e3ca524cb38ec92deea37629718e98aba43bc5d

OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 7058bd1712828a78d34457b1cfc32bdc1e6d3d33

This issue was discovered and fixed by Stephen Henson of the OpenSSL
development team.

ASN.1 structure reuse memory corruption (CVE-2015-0287)
=======================================================

Severity: Moderate

Reusing a structure in ASN.1 parsing may allow an attacker to cause
memory corruption via an invalid write. Such reuse is and has been
strongly discouraged and is believed to be rare.

Applications that parse structures containing CHOICE or ANY DEFINED BY
components may be affected. Certificate parsing (d2i_X509 and related
functions) are however not affected. OpenSSL clients and servers are
not affected.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit 0ca8edbe6ec402e39c9e095f8ae11dba8fa93fc1

OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a9f34a7aac5fd89f33a34fb71e954b85fbf35875

OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit d96692c933fe02829c3e922bf7f239e0bd003759

OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit 5722767d5dc1a3b5505058fe27877fc993fe9a5a

This issue was discovered by Emilia Kè¾°sper and a fix developed by
Stephen Henson of the OpenSSL development team.

PKCS7 NULL pointer dereferences (CVE-2015-0289)
===============================================

Severity: Moderate

The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
missing content and trigger a NULL pointer dereference on parsing.

Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
otherwise parse PKCS#7 structures from untrusted sources are
affected. OpenSSL clients and servers are not affected.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit e0d6a791c53b64da64277c5565eb89b1cb149fc3

OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit d3d52c73544bba800c2a8f5ef3376358158cf2ca

OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit 1f858109d0556b5864bb6a0aa3e2d177b1cc4552

OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit f20caf7f66cb1eb9ba9562e6097bc7b64d207cb9

This issue was reported to OpenSSL on February 16th 2015 by Michal
Zalewski (Google) and a fix developed by Emilia Kè¾°sper of the OpenSSL
development team.

Base64 decode (CVE-2015-0292)
=============================

Severity: Moderate

A vulnerability existed in previous versions of OpenSSL related to the
processing of base64 encoded data. Any code path that reads base64 data from an
untrusted source could be affected (such as the PEM processing routines).
Maliciously crafted base 64 data could trigger a segmenation fault or memory
corruption. This was addressed in previous versions of OpenSSL but has not been
included in any security advisory until now.

This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.1 users should upgrade to 1.0.1h.
OpenSSL 1.0.0 users should upgrade to 1.0.0m.
OpenSSL 0.9.8 users should upgrade to 0.9.8za.

The fix for this issue can be identified by commits d0666f289a (1.0.1),
84fe686173 (1.0.0) and 9febee0272 (0.9.8). This issue was originally reported by
Robert Dugal and subsequently by David Ramos.

DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
=========================================================

Severity: Moderate

A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
servers that both support SSLv2 and enable export cipher suites by sending
a specially crafted SSLv2 CLIENT-MASTER-KEY message.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2a
commit b29d57f20d4821a9d3f4e19673a89615e4c6fcf0

OpenSSL 1.0.1 users should upgrade to 1.0.1m.
commit a40c1bcb8c37fbad24d8f28f0fb0204d76f0fee2

OpenSSL 1.0.0 users should upgrade to 1.0.0r.
commit ee4435e5b587879e7bd66df10d4d9ec274e2b163

OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
commit ab646ee5a6a7b8cace425a617a053ad6d7977086

This issue was discovered by Sean Burford (Google) and Emilia Kè¾°sper
(OpenSSL development team) in March 2015 and the fix was developed by
Emilia Kè¾°sper.

Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
===============================================================

Severity: Low

A malformed EC private key file consumed via the d2i_ECPrivateKey function could
cause a use after free condition. This, in turn, could cause a double
free in several private key parsing functions (such as d2i_PrivateKey
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
for applications that receive EC private keys from untrusted
sources. This scenario is considered rare.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://github.com/openssl/openssl/commit/1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a

This issue was discovered by the BoringSSL project and fixed in their commit
517073cd4b. The OpenSSL fix was developed by Matt Caswell of the OpenSSL
development team.

X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
===================================================

Severity: Low

The function X509_to_X509_REQ will crash with a NULL pointer dereference if
the certificate key is invalid. This function is rarely used in practice.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
and 0.9.8.

** issue already committed **
OpenSSL 1.0.2 users should upgrade to 1.0.2a
OpenSSL 1.0.1 users should upgrade to 1.0.1m.
OpenSSL 1.0.0 users should upgrade to 1.0.0r.
OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9

This issue was discovered by Brian Carpenter and a fix developed by Stephen
Henson of the OpenSSL development team.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150319.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

(spz)

2015-03-19 14:22:23 UTC MAIN commitmail json YAML

Sync ixg(4) up to FreeBSD r230572.

- Fix in the interrupt handler to make sure the stack TX queue is processed.
  (FreeBSD r222588)
- The maximum read size of incoming packets is done in 1024-byte increments.
  The current code was rounding down the maximum frame size instead of
  routing up, resulting in a read size of 1024 bytes, in the non-jumbo
  frame case, and splitting the packets across multiple mbufs.
  (FreeBSD r225045)
- Consequently the above problem exposed another issue, which is when
  packets were splitted across multiple mbufs, and all of the mbufs in the
  chain have the M_PKTHDR flag set. (FreeBSD r225045)
- Use the correct constant for conversion between interrupt rate
  and EITR values (the previous values were off by a factor of 2)
  (FreeBSD r230572)
- Make dev.ix.N.queueM.interrupt_rate a RW sysctl variable. Changing
  individual values affects the queue immediately, and propagates to all
  interfaces at the next reinit. (FreeBSD r230572)
- Add dev.ix.N.queueM.irqs rdonly sysctl, to export the actual interrupt
  counts. (FreeBSD r230572)
- Some netmap related changes.

(msaitoh)

2015-03-19 12:22:36 UTC MAIN commitmail json YAML

2015-03-19 12:22:00 UTC MAIN commitmail json YAML

spin up SMBus clocks before attaching drivers
TODO: only enable clocks for drivers that actually attach

(macallan)

2015-03-19 05:46:25 UTC MAIN commitmail json YAML

Remove #ifdef MAP_INHERIT_ZERO.

This is essential for fork-safety, so don't merely #warn about it.
Attaining fork-safety without it requires restructuring things -- in
particular, there's no clear way to make it per-thread and fork-safe
without some global list of states to zero on fork.

(riastradh)

2015-03-18 23:03:06 UTC MAIN commitmail json YAML

disable DEBUG, LOCKDEBUG, VERBOSE_INIT_ARM

(jmcneill)

2015-03-18 21:02:47 UTC MAIN commitmail json YAML

Ensure _lwp_setcontext gets consistent language binding.

(joerg)

2015-03-18 20:11:35 UTC MAIN commitmail json YAML

Switch to the suggested constant-time result conversion.

Not hard to find CPU/compiler combinations with branches for `!res'.

While here, make everything unsigned for good measure.

(riastradh)

2015-03-18 17:43:20 UTC MAIN commitmail json YAML

2015-03-18 17:32:29 UTC LLVM commitmail json YAML

2015-03-18 17:28:11 UTC netbsd-5 commitmail json YAML

2015-03-18 17:21:22 UTC netbsd-5 commitmail json YAML

2015-03-18 17:20:09 UTC netbsd-5 commitmail json YAML

Pull up following revision(s) (requested by joerg in ticket #1149):
sys/compat/linux32/arch/amd64/syscalls.master: revisions 1.52, 1.53 via patch
sys/compat/linux32/common/linux32_misc.c: revision 1.17 via patch
sys/compat/linux32/common/linux32_stat.c: revision 1.14-1.16 via patch
Fix inverted lst_ino/__lst_ino assignment in linux32_from_stat().
--
Cleanup (no functional changes).
Kill some unneeded variables and return stattement.
Rename linux32_from_stat() to better bsd_to_linux32_stat64().
Fix some types.
Add stat/lstat/fstat syscalls.
--
Add fstatfs syscall.

(snj)

2015-03-18 16:30:44 UTC netbsd-5 commitmail json YAML

Pull up following revision(s) (requested by nakayama in ticket #1952):
sys/dev/cons.c: revision 1.74
Fix strange kernel output sequence "\n\r" observed in serial
consoles.  Output '\r' before '\n' in conversion.

(snj)

2015-03-18 15:45:45 UTC nick-nhusb commitmail json YAML

2015-03-18 13:30:13 UTC MAIN commitmail json YAML

New sentence, new line. Fix typos. Bump date for previous.

(wiz)

2015-03-18 13:23:49 UTC MAIN commitmail json YAML

Add iflag and oflag operands to dd(1)

Like GNU dd(1) similar operands, iflag and oflag allow specifying the
O_* flags given to open(2) for the input and the output file. The values
are comma-sepratated, lower-case, O_ prefix-stripped constants documented
in open(2).

Since iflag and oflag override default values, specifying oflag means
O_CREATE is not set by default and must be specified explicitely.

Some values do not make sense (e.g.: iflag=directory) but are still used
and will raise a warning. For oflag, values rdonly, rdwr and wronly are
filtered out with a warning (dd(1) attempts open(2) with O_RDWR and
then O_WRONLY on failure).

Specifying oflag=trunc along with (seek, oseek or conv=notrunc) is
contradictory and will raise an error.

iflag and oflag are disabled if building with -DMALLPROG

(manu)

2015-03-18 13:20:20 UTC MAIN commitmail json YAML

"rump" -> "rump kernel" police

(pooka)

2015-03-18 08:52:00 UTC netbsd-7 commitmail json YAML

tickets 597, 599-605, 607, 609-613, 615, 62[23]

(snj)

2015-03-18 08:46:32 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #607):
share/man/man9/pserialize.9: revisions 1.4-1.8
Expand pserialize(9) example to include publish, read, and destroy.
--
Bump date.
--
Fix typo: pserialize_read_exit(s), not s = pserialize_read_exit().
--
Elaborate comment before pserialize_perform.
--
Use membar_consumer until we have membar_datadep_consumer.

(snj)

2015-03-18 08:36:44 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by joerg in ticket #616):
sys/arch/arm/include/fenv.h: revision 1.3
__BEGIN_DECLS and __END_DECLS only exist if sys/cdefs.h was included.

(snj)

2015-03-18 08:33:08 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #613):
share/man/man9/uvm_km.9: revision 1.4
Clarify uvm_km_alloc is contiguous and zero result means fail.

(snj)

2015-03-18 08:31:01 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #612):
sys/arch/amd64/include/pmap.h: revision 1.35
Bump amd64 module map size to 32 MB.
For lack of anything better to do, after no progress in discussion on
the matter:
https://mail-index.netbsd.org/port-amd64/2014/08/22/msg002108.html
Needed in order to load the (solaris module needed by) dtrace module.

(snj)

2015-03-18 08:27:34 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #611):
doc/BUILDING.mdoc: revision 1.111
Use `It Sy', not just `It', for live-image, to match other targets.
No change to plain-text BUILDING file.

(snj)

2015-03-18 08:24:57 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #610):
lib/libc/string/consttime_memequal.3: revision 1.3, 1.4
Commit to returning 1, not any nonzero value.
--
bump year

(snj)

2015-03-18 08:21:47 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #609):
usr.bin/vndcompress/Makefile: revision 1.14
usr.bin/vndcompress/vndcompress.c: revision 1.25
Fix vndcompress restart failure fallback when input is a pipe.
Defer seeking the *input* image, or winding it forward, until we are
certain we all ready in the cloop2 output, because when the input
image is a pipe, we don't get a chance to seek back to the beginning
and start from the top instead of restarting.
If restart does fail, don't try to seek the input image back to the
beginning unless we had already tried to seek or wind it forward.
Add some automatic tests for this and related cases.
XXX pullup to netbsd-7, netbsd-6

(snj)

2015-03-18 08:18:26 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #623):
xsrc/external/mit/xorg-server/dist/hw/xfree86/os-support/bsd/bsd_init.c: revision 1.7
remove \n\n that confuses the Xorg log file.

(snj)

2015-03-18 08:14:17 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #622):
games/tetris/tetris.6: revision 1.15
games/tetris/tetris.c: revision 1.28
add a 'down' key to tetris, defaulting to 'n'.  it move the block down
a line, if it fits.  like most other tetris games have.
minor clean up of magic number usage while here.

(snj)

2015-03-18 08:12:16 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #615):
share/mk/bsd.README: revision 1.339
fix the description of MKX11RADEONKMS, as pointed out in PR#49753.

(snj)

2015-03-18 08:03:27 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #605):
share/man/man9/cprng.9: revision 1.10
Clarify advice about when to use what parts of cprng(9).
Add security model to specify the difference between cprng_strong and
cprng_fast.
Fix code references.  cprng_fast now uses ChaCha8, not RC4.
XXX Would have been nice if they had been called cprng and cprng_weak
to reduce confusion about which one to use, or even random and
weakrandom.  Too late for that now, though.

(snj)

2015-03-18 07:55:59 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #604):
usr.bin/ktrace/ktrace.1: revision 1.43
Omit no longer existing l, m from default trace points.

(snj)

2015-03-18 07:54:26 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #603):
share/man/man4/rnd.4: revision 1.21
Rewrite /dev/random man page.
- Describe application usage up front.
- State the security model.
- Explain entropy.
- Describe current implementation strategy near the bottom.

(snj)

2015-03-18 07:53:06 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #602):
lib/libc/stdio/fopen.3: revision 1.30
Use Pq to avoid space before O_EXCL.

(snj)

2015-03-18 07:51:41 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #601):
share/man/man2/siginfo.2: revision 1.7
Fix some typos and make style more consistent.

(snj)

2015-03-18 07:50:01 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #597):
lib/libc/gen/arc4random.c: revisions 1.26-1.28
lib/libc/gen/arc4random.3:: revisions 1.10-1.19
Rewrite arc4random(3) with ChaCha20-based PRNG and per-thread state.
Explain the security model in the man page.
No more RC4!
--
Grammar.
--
Note relation of arc4random(3) to rand(3)/random(3).
--
Ruminate on security model choices and API design in arc4random(3).
--
Amplify comment about how quickly RC4 was known to be bad.
--
Markup for BUGS note about arc4random_uniform.
--
Cross-reference rnd(4).
--
Remove unnecessary Ns before punctuation. Fix a line.
--
Fix Google Groups link.
--
Tweak wording, define `output', remove misplaced scaremongering.
--
Fix non _REENTRANT build.
--
Use ChaCha20 here as advertised, not ChaCha8.
Oops.
Fortunately, there is no public cryptanalysis even of ChaCha8: the
best published attack is on ChaCha7 with time complexity 2^248.

(snj)

2015-03-18 07:47:29 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #600):
common/lib/libc/arch/alpha/atomic/membar_ops.S: revision 1.7
lib/libc/atomic/membar_ops.3: revision 1.4
sys/arch/alpha/include/types.h: revision 1.50
sys/sys/atomic.h: revision 1.13
Introduce membar_datadep_consumer.
Discussed briefly on tech-kern without objection:
https://mail-index.netbsd.org/tech-kern/2014/11/20/msg018054.html
https://mail-index.netbsd.org/tech-kern/2015/01/07/msg018326.html

(snj)

2015-03-18 07:42:45 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #599):
share/man/man9/pci_intr.9: revision 1.18
Fix type of pc argument in pci_intr(9) man page.

(snj)

2015-03-18 07:37:02 UTC nick-nhusb commitmail json YAML

2015-03-18 06:42:02 UTC nick-nhusb commitmail json YAML

No need to touch ux_done in ehci_device_{fs_,}isoc_start

(skrll)

2015-03-18 05:54:14 UTC MAIN commitmail json YAML

2015-03-18 05:44:13 UTC MAIN commitmail json YAML

2015-03-18 05:43:49 UTC MAIN commitmail json YAML

Add some Intel 9 series devices.

(msaitoh)

2015-03-18 04:43:41 UTC netbsd-7 commitmail json YAML

2015-03-18 04:42:11 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #618):
sys/arch/xen/include/evtchn.h: revision 1.23
sys/arch/xen/xen/evtchn.c: revision 1.71
sys/arch/xen/xen/pci_intr_machdep.c: revision 1.17
Properly implemement pci_intr_disestablish(9), so that interrupt
handlers stop being called when the device has been detached.
Should fix PR port-xen/47720 (which turns out to not be related to raidframe).
While there fix possible races in event_remove_handler() and pirq_establish().

(snj)

2015-03-18 04:39:15 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #614):
sys/dev/pci/if_wm.c: revision 1.311-1.313
sys/dev/pci/if_wmreg.h: revision 1.66
Fix a bug that sc_mediatype is evaluated incorrectly. The real problem
might be occured only on fiber and serdes cases.
#####
- Initialize some hardware bits for 8257[1234], 82583, 80003, ICH* and PCH*.
  Some of them are workaround code. From other *BSDs, Linux and documents.
- Add comment.
- Fix typo in comment.
#####
Fix a bug that the first access to NVM is failed on 8254[17] which use
SPI EEPROM. Observed on Dell PowerEdge [12]850. Thanks Tom Ivar Helbekkmo
for debugging.

(snj)

2015-03-18 03:57:16 UTC netbsd-7 commitmail json YAML

2015-03-18 02:57:13 UTC MAIN commitmail json YAML

Hack against the blank console problem:
Leave the CLUT alone on ancient cards. At least this leaves us with a
semi working console (red and blue are flipped). Leave an example of what
seems to be happening but disable it because colors are better than 444 bit
greyscale.

(christos)

2015-03-18 02:05:05 UTC MAIN commitmail json YAML

fix commented out nouveaufb

(snj)

2015-03-17 22:34:10 UTC MAIN commitmail json YAML

Don't try to catch undefined VFP instructions if we own the the FPU.
Let them raise SIGILL.

(matt)

2015-03-17 22:29:40 UTC MAIN commitmail json YAML

Add CPUFREQ option to set boot CPU frequency. ODROID-C1 is advertised
as quad-core 1.5GHz but boots up at 1.2GHz; add CPUFREQ=1512 to config
and make sure to set the correct speed before attaching CPUs.

The speed can still be scaled down with machdep.cpu sysctls.

(jmcneill)

2015-03-17 20:56:39 UTC nick-nhusb commitmail json YAML

2015-03-17 19:41:43 UTC MAIN commitmail json YAML

2015-03-17 19:39:15 UTC MAIN commitmail json YAML

2015-03-17 19:39:10 UTC netbsd-6 commitmail json YAML

2015-03-17 19:38:43 UTC netbsd-6-0 commitmail json YAML

2015-03-17 19:38:32 UTC netbsd-6-1 commitmail json YAML

2015-03-17 19:36:52 UTC netbsd-6-1 commitmail json YAML

src/external/zlib/pigz/bin/pigz/Makefile@1.7.18.1 / diff / nxr@1.7.18.1
src/external/zlib/pigz/dist/Makefile@1.1.1.1.20.1 / diff / nxr@1.1.1.1.20.1
src/external/zlib/pigz/dist/README@1.1.1.1.20.1 / diff / nxr@1.1.1.1.20.1
src/external/zlib/pigz/dist/pigz.1@1.2.20.1 / diff / nxr@1.2.20.1
src/external/zlib/pigz/dist/pigz.c@1.1.1.1.20.1 / diff / nxr@1.1.1.1.20.1
src/external/zlib/pigz/dist/pigz.pdf@1.1.1.1.20.1 / diff / nxr@1.1.1.1.20.1
src/external/zlib/pigz/dist/pigz.ps deleted
src/external/zlib/pigz/dist/pigz.spec@1.1.1.1.20.1 / diff / nxr@1.1.1.1.20.1
src/external/zlib/pigz/dist/yarn.c@1.1.1.1.20.1 / diff / nxr@1.1.1.1.20.1
src/external/zlib/pigz/dist/yarn.h@1.1.1.1.20.1 / diff / nxr@1.1.1.1.20.1
src/external/zlib/pigz/dist/zopfli/CONTRIBUTORS@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/COPYING@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/README@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/blocksplitter.c@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/blocksplitter.h@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/cache.c@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/cache.h@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/deflate.c@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/deflate.h@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
src/external/zlib/pigz/dist/zopfli/gzip_container.c@1.1.1.1.12.2 / diff / nxr@1.1.1.1.12.2
      :
(more 19 files)
Pull up following revision(s) (requested by mrg in ticket #1268):
external/zlib/pigz/bin/pigz/Makefile: up to 1.8
external/zlib/pigz/dist/Makefile: up to 1.1.1.2
external/zlib/pigz/dist/README: up to 1.1.1.2
external/zlib/pigz/dist/pigz.1: up to 1.5
external/zlib/pigz/dist/pigz.c: up to 1.2
external/zlib/pigz/dist/pigz.pdf: up to 1.1.1.2
external/zlib/pigz/dist/pigz.ps: delete
external/zlib/pigz/dist/pigz.spec: up to 1.1.1.2
external/zlib/pigz/dist/yarn.c: up to 1.1.1.2
external/zlib/pigz/dist/yarn.h: up to 1.1.1.2
external/zlib/pigz/dist/zopfli/CONTRIBUTORS: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/COPYING: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/README: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/blocksplitter.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/blocksplitter.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/cache.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/cache.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/deflate.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/deflate.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/gzip_container.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/gzip_container.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/hash.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/hash.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/katajainen.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/katajainen.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/lz77.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/lz77.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/makefile: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/squeeze.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/squeeze.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/tree.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/tree.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/util.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/util.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zlib_container.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zlib_container.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli_bin.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli_lib.c: up to 1.1.1.1
sync pigz with HEAD

(snj)

2015-03-17 19:35:48 UTC netbsd-6-0 commitmail json YAML

src/external/zlib/pigz/bin/pigz/Makefile@1.7.12.1 / diff / nxr@1.7.12.1
src/external/zlib/pigz/dist/Makefile@1.1.1.1.14.1 / diff / nxr@1.1.1.1.14.1
src/external/zlib/pigz/dist/README@1.1.1.1.14.1 / diff / nxr@1.1.1.1.14.1
src/external/zlib/pigz/dist/pigz.1@1.2.14.1 / diff / nxr@1.2.14.1
src/external/zlib/pigz/dist/pigz.c@1.1.1.1.14.1 / diff / nxr@1.1.1.1.14.1
src/external/zlib/pigz/dist/pigz.pdf@1.1.1.1.14.1 / diff / nxr@1.1.1.1.14.1
src/external/zlib/pigz/dist/pigz.ps deleted
src/external/zlib/pigz/dist/pigz.spec@1.1.1.1.14.1 / diff / nxr@1.1.1.1.14.1
src/external/zlib/pigz/dist/yarn.c@1.1.1.1.14.1 / diff / nxr@1.1.1.1.14.1
src/external/zlib/pigz/dist/yarn.h@1.1.1.1.14.1 / diff / nxr@1.1.1.1.14.1
src/external/zlib/pigz/dist/zopfli/CONTRIBUTORS@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/COPYING@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/README@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/blocksplitter.c@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/blocksplitter.h@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/cache.c@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/cache.h@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/deflate.c@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/deflate.h@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
src/external/zlib/pigz/dist/zopfli/gzip_container.c@1.1.1.1.10.2 / diff / nxr@1.1.1.1.10.2
      :
(more 19 files)
Pull up following revision(s) (requested by mrg in ticket #1268):
external/zlib/pigz/bin/pigz/Makefile: up to 1.8
external/zlib/pigz/dist/Makefile: up to 1.1.1.2
external/zlib/pigz/dist/README: up to 1.1.1.2
external/zlib/pigz/dist/pigz.1: up to 1.5
external/zlib/pigz/dist/pigz.c: up to 1.2
external/zlib/pigz/dist/pigz.pdf: up to 1.1.1.2
external/zlib/pigz/dist/pigz.ps: delete
external/zlib/pigz/dist/pigz.spec: up to 1.1.1.2
external/zlib/pigz/dist/yarn.c: up to 1.1.1.2
external/zlib/pigz/dist/yarn.h: up to 1.1.1.2
external/zlib/pigz/dist/zopfli/CONTRIBUTORS: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/COPYING: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/README: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/blocksplitter.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/blocksplitter.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/cache.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/cache.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/deflate.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/deflate.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/gzip_container.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/gzip_container.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/hash.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/hash.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/katajainen.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/katajainen.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/lz77.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/lz77.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/makefile: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/squeeze.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/squeeze.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/tree.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/tree.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/util.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/util.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zlib_container.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zlib_container.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli_bin.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli_lib.c: up to 1.1.1.1
sync pigz with HEAD

(snj)

2015-03-17 19:32:37 UTC netbsd-6 commitmail json YAML

src/external/zlib/pigz/bin/pigz/Makefile@1.7.6.1 / diff / nxr@1.7.6.1
src/external/zlib/pigz/dist/Makefile@1.1.1.1.8.1 / diff / nxr@1.1.1.1.8.1
src/external/zlib/pigz/dist/README@1.1.1.1.8.1 / diff / nxr@1.1.1.1.8.1
src/external/zlib/pigz/dist/pigz.1@1.2.8.1 / diff / nxr@1.2.8.1
src/external/zlib/pigz/dist/pigz.c@1.1.1.1.8.1 / diff / nxr@1.1.1.1.8.1
src/external/zlib/pigz/dist/pigz.pdf@1.1.1.1.8.1 / diff / nxr@1.1.1.1.8.1
src/external/zlib/pigz/dist/pigz.ps deleted
src/external/zlib/pigz/dist/pigz.spec@1.1.1.1.8.1 / diff / nxr@1.1.1.1.8.1
src/external/zlib/pigz/dist/yarn.c@1.1.1.1.8.1 / diff / nxr@1.1.1.1.8.1
src/external/zlib/pigz/dist/yarn.h@1.1.1.1.8.1 / diff / nxr@1.1.1.1.8.1
src/external/zlib/pigz/dist/zopfli/CONTRIBUTORS@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/COPYING@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/README@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/blocksplitter.c@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/blocksplitter.h@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/cache.c@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/cache.h@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/deflate.c@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/deflate.h@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
src/external/zlib/pigz/dist/zopfli/gzip_container.c@1.1.1.1.8.2 / diff / nxr@1.1.1.1.8.2
      :
(more 19 files)
Pull up following revision(s) (requested by mrg in ticket #1268):
external/zlib/pigz/bin/pigz/Makefile: up to 1.8
external/zlib/pigz/dist/Makefile: up to 1.1.1.2
external/zlib/pigz/dist/README: up to 1.1.1.2
external/zlib/pigz/dist/pigz.1: up to 1.5
external/zlib/pigz/dist/pigz.c: up to 1.2
external/zlib/pigz/dist/pigz.pdf: up to 1.1.1.2
external/zlib/pigz/dist/pigz.ps: delete
external/zlib/pigz/dist/pigz.spec: up to 1.1.1.2
external/zlib/pigz/dist/yarn.c: up to 1.1.1.2
external/zlib/pigz/dist/yarn.h: up to 1.1.1.2
external/zlib/pigz/dist/zopfli/CONTRIBUTORS: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/COPYING: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/README: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/blocksplitter.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/blocksplitter.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/cache.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/cache.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/deflate.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/deflate.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/gzip_container.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/gzip_container.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/hash.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/hash.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/katajainen.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/katajainen.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/lz77.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/lz77.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/makefile: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/squeeze.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/squeeze.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/tree.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/tree.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/util.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/util.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zlib_container.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zlib_container.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli.h: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli_bin.c: up to 1.1.1.1
external/zlib/pigz/dist/zopfli/zopfli_lib.c: up to 1.1.1.1
sync pigz with HEAD

(snj)

2015-03-17 19:10:12 UTC nick-nhusb commitmail json YAML

2015-03-17 19:02:44 UTC nick-nhusb commitmail json YAML

2015-03-17 19:00:43 UTC netbsd-7 commitmail json YAML

2015-03-17 18:57:36 UTC netbsd-7 commitmail json YAML

xsrc/external/mit/libXfont/dist/ChangeLog@1.1.1.7.2.2 / diff / nxr@1.1.1.7.2.2
xsrc/external/mit/libXfont/dist/Makefile.in@1.1.1.6.2.2 / diff / nxr@1.1.1.6.2.2
xsrc/external/mit/libXfont/dist/aclocal.m4@1.1.1.7.2.2 / diff / nxr@1.1.1.7.2.2
xsrc/external/mit/libXfont/dist/compile@1.1.1.1.2.1 / diff / nxr@1.1.1.1.2.1
xsrc/external/mit/libXfont/dist/config.guess@1.1.1.5.2.2 / diff / nxr@1.1.1.5.2.2
xsrc/external/mit/libXfont/dist/config.sub@1.1.1.5.2.2 / diff / nxr@1.1.1.5.2.2
xsrc/external/mit/libXfont/dist/configure@1.1.1.7.2.2 / diff / nxr@1.1.1.7.2.2
xsrc/external/mit/libXfont/dist/configure.ac@1.1.1.7.2.2 / diff / nxr@1.1.1.7.2.2
xsrc/external/mit/libXfont/dist/depcomp@1.1.1.5.2.1 / diff / nxr@1.1.1.5.2.1
xsrc/external/mit/libXfont/dist/doc/Makefile.in@1.1.1.2.2.2 / diff / nxr@1.1.1.2.2.2
xsrc/external/mit/libXfont/dist/install-sh@1.1.1.5.2.1 / diff / nxr@1.1.1.5.2.1
xsrc/external/mit/libXfont/dist/missing@1.1.1.5.2.2 / diff / nxr@1.1.1.5.2.2
xsrc/external/mit/libXfont/dist/src/FreeType/Makefile.in@1.1.1.6.2.2 / diff / nxr@1.1.1.6.2.2
xsrc/external/mit/libXfont/dist/src/Makefile.in@1.1.1.6.2.2 / diff / nxr@1.1.1.6.2.2
xsrc/external/mit/libXfont/dist/src/bitmap/Makefile.in@1.1.1.6.2.2 / diff / nxr@1.1.1.6.2.2
xsrc/external/mit/libXfont/dist/src/bitmap/bdfread.c@1.3.4.1 / diff / nxr@1.3.4.1
xsrc/external/mit/libXfont/dist/src/builtins/Makefile.in@1.1.1.6.2.2 / diff / nxr@1.1.1.6.2.2
xsrc/external/mit/libXfont/dist/src/fc/Makefile.in@1.1.1.6.2.2 / diff / nxr@1.1.1.6.2.2
xsrc/external/mit/libXfont/dist/src/fc/fslibos.h@1.1.1.3.4.1 / diff / nxr@1.1.1.3.4.1
xsrc/external/mit/libXfont/dist/src/fontfile/Makefile.in@1.1.1.6.2.2 / diff / nxr@1.1.1.6.2.2
      :
(more 3 files)
Pull up following revision(s) (requested by mrg in ticket #620):
xsrc/external/mit/libXfont/dist/ChangeLog: up to 1.1.1.9
xsrc/external/mit/libXfont/dist/Makefile.in: up to 1.1.1.8
xsrc/external/mit/libXfont/dist/aclocal.m4: up to 1.1.1.9
xsrc/external/mit/libXfont/dist/compile: up to 1.1.1.2
xsrc/external/mit/libXfont/dist/config.guess: up to 1.1.1.7
xsrc/external/mit/libXfont/dist/config.sub: up to 1.1.1.7
xsrc/external/mit/libXfont/dist/configure: up to 1.1.1.9
xsrc/external/mit/libXfont/dist/configure.ac: up to 1.1.1.9
xsrc/external/mit/libXfont/dist/depcomp: up to 1.1.1.6
xsrc/external/mit/libXfont/dist/doc/Makefile.in: up to 1.1.1.4
xsrc/external/mit/libXfont/dist/install-sh: up to 1.1.1.6
xsrc/external/mit/libXfont/dist/missing: up to 1.1.1.7
xsrc/external/mit/libXfont/dist/src/FreeType/Makefile.in: up to 1.1.1.8
xsrc/external/mit/libXfont/dist/src/Makefile.in: up to 1.1.1.8
xsrc/external/mit/libXfont/dist/src/bitmap/Makefile.in: up to 1.1.1.8
xsrc/external/mit/libXfont/dist/src/bitmap/bdfread.c: up to 1.4
xsrc/external/mit/libXfont/dist/src/builtins/Makefile.in: up to 1.1.1.8
xsrc/external/mit/libXfont/dist/src/fc/Makefile.in: up to 1.1.1.8
xsrc/external/mit/libXfont/dist/src/fc/fslibos.h: up to 1.1.1.4
xsrc/external/mit/libXfont/dist/src/fontfile/Makefile.in: up to 1.1.1.8
xsrc/external/mit/libXfont/dist/src/stubs/Makefile.in: up to 1.1.1.8
xsrc/external/mit/libXfont/dist/src/util/Makefile.in: up to 1.1.1.8
Update libXfont to 1.5.1.
--
regen for libXfont 1.5.1.

(snj)

2015-03-17 18:49:51 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #620):
xfree/xc/lib/font/bitmap/bdfread.c: revision 1.5
pull across bfdread.c fixes from libXfont 1.5.1, which fixes:
- CVE-2015-1802: bdfReadProperties: property count needs range check
    The bdf parser reads a count for the number of properties defined in
    a font from the font file, and allocates arrays with entries for each
    property based on that count.  It never checked to see if that count
    was negative, or large enough to overflow when multiplied by the size
    of the structures being allocated, and could thus allocate the wrong
    buffer size, leading to out of bounds writes.
- CVE-2015-1803: bdfReadCharacters: bailout if a char's bitmap cannot be read
    If the bdf parser failed to parse the data for the bitmap for any
    character, it would proceed with an invalid pointer to the bitmap
    data and later crash when trying to read the bitmap from that pointer.
- CVE-2015-1804: bdfReadCharacters: ensure metrics fit into xCharInfo struct
    The bdf parser read metrics values as 32-bit integers, but stored
    them into 16-bit integers.  Overflows could occur in various operations
    leading to out-of-bounds memory access.

(snj)

2015-03-17 18:44:37 UTC netbsd-5-2 commitmail json YAML

2015-03-17 18:44:15 UTC netbsd-5-2 commitmail json YAML

Apply patch (requested by mrg in ticket #1953):
Fix the following security issues:
CVE-2015-1802: bdfReadProperties: property count needs range check

    The bdf parser reads a count for the number of properties defined in
    a font from the font file, and allocates arrays with entries for each
    property based on that count.  It never checked to see if that count
    was negative, or large enough to overflow when multiplied by the size
    of the structures being allocated, and could thus allocate the wrong
    buffer size, leading to out of bounds writes.

CVE-2015-1803: bdfReadCharacters: bailout if a char's bitmap cannot be read

    If the bdf parser failed to parse the data for the bitmap for any
    character, it would proceed with an invalid pointer to the bitmap
    data and later crash when trying to read the bitmap from that pointer.

CVE-2015-1804: bdfReadCharacters: ensure metrics fit into xCharInfo struct

    The bdf parser read metrics values as 32-bit integers, but stored
    them into 16-bit integers.  Overflows could occur in various operations

(snj)

2015-03-17 18:43:50 UTC netbsd-5-1 commitmail json YAML

2015-03-17 18:43:29 UTC netbsd-5-1 commitmail json YAML

Apply patch (requested by mrg in ticket #1953):
Fix the following security issues:
CVE-2015-1802: bdfReadProperties: property count needs range check

    The bdf parser reads a count for the number of properties defined in
    a font from the font file, and allocates arrays with entries for each
    property based on that count.  It never checked to see if that count
    was negative, or large enough to overflow when multiplied by the size
    of the structures being allocated, and could thus allocate the wrong
    buffer size, leading to out of bounds writes.

CVE-2015-1803: bdfReadCharacters: bailout if a char's bitmap cannot be read

    If the bdf parser failed to parse the data for the bitmap for any
    character, it would proceed with an invalid pointer to the bitmap
    data and later crash when trying to read the bitmap from that pointer.

CVE-2015-1804: bdfReadCharacters: ensure metrics fit into xCharInfo struct

    The bdf parser read metrics values as 32-bit integers, but stored
    them into 16-bit integers.  Overflows could occur in various operations

(snj)

2015-03-17 18:43:10 UTC netbsd-5 commitmail json YAML

2015-03-17 18:42:34 UTC netbsd-5 commitmail json YAML

Apply patch (requested by mrg in ticket #1953):
Fix the following security issues:
CVE-2015-1802: bdfReadProperties: property count needs range check

    The bdf parser reads a count for the number of properties defined in
    a font from the font file, and allocates arrays with entries for each
    property based on that count.  It never checked to see if that count
    was negative, or large enough to overflow when multiplied by the size
    of the structures being allocated, and could thus allocate the wrong
    buffer size, leading to out of bounds writes.

CVE-2015-1803: bdfReadCharacters: bailout if a char's bitmap cannot be read

    If the bdf parser failed to parse the data for the bitmap for any
    character, it would proceed with an invalid pointer to the bitmap
    data and later crash when trying to read the bitmap from that pointer.

CVE-2015-1804: bdfReadCharacters: ensure metrics fit into xCharInfo struct

    The bdf parser read metrics values as 32-bit integers, but stored
    them into 16-bit integers.  Overflows could occur in various operations

(snj)

2015-03-17 18:38:59 UTC netbsd-6-1 commitmail json YAML

2015-03-17 18:38:37 UTC netbsd-6-0 commitmail json YAML

2015-03-17 18:38:14 UTC netbsd-6 commitmail json YAML

2015-03-17 18:36:41 UTC MAIN commitmail json YAML

2015-03-17 18:36:07 UTC netbsd-6-1 commitmail json YAML

Apply patch (requested by mrg in ticket #1280):
Fix the following security issues:
CVE-2015-1802: bdfReadProperties: property count needs range check

    The bdf parser reads a count for the number of properties defined in
    a font from the font file, and allocates arrays with entries for each
    property based on that count.  It never checked to see if that count
    was negative, or large enough to overflow when multiplied by the size
    of the structures being allocated, and could thus allocate the wrong
    buffer size, leading to out of bounds writes.

CVE-2015-1803: bdfReadCharacters: bailout if a char's bitmap cannot be read

    If the bdf parser failed to parse the data for the bitmap for any
    character, it would proceed with an invalid pointer to the bitmap
    data and later crash when trying to read the bitmap from that pointer.

CVE-2015-1804: bdfReadCharacters: ensure metrics fit into xCharInfo struct

    The bdf parser read metrics values as 32-bit integers, but stored
    them into 16-bit integers.  Overflows could occur in various operations

(snj)

2015-03-17 18:35:35 UTC netbsd-6-0 commitmail json YAML

Apply patch (requested by mrg in ticket #1280):
Fix the following security issues:
CVE-2015-1802: bdfReadProperties: property count needs range check

    The bdf parser reads a count for the number of properties defined in
    a font from the font file, and allocates arrays with entries for each
    property based on that count.  It never checked to see if that count
    was negative, or large enough to overflow when multiplied by the size
    of the structures being allocated, and could thus allocate the wrong
    buffer size, leading to out of bounds writes.

CVE-2015-1803: bdfReadCharacters: bailout if a char's bitmap cannot be read

    If the bdf parser failed to parse the data for the bitmap for any
    character, it would proceed with an invalid pointer to the bitmap
    data and later crash when trying to read the bitmap from that pointer.

CVE-2015-1804: bdfReadCharacters: ensure metrics fit into xCharInfo struct

    The bdf parser read metrics values as 32-bit integers, but stored
    them into 16-bit integers.  Overflows could occur in various operations

(snj)

2015-03-17 18:35:09 UTC netbsd-6 commitmail json YAML

Apply patch (requested by mrg in ticket #1280):
Fix the following security issues:
CVE-2015-1802: bdfReadProperties: property count needs range check

    The bdf parser reads a count for the number of properties defined in
    a font from the font file, and allocates arrays with entries for each
    property based on that count.  It never checked to see if that count
    was negative, or large enough to overflow when multiplied by the size
    of the structures being allocated, and could thus allocate the wrong
    buffer size, leading to out of bounds writes.

CVE-2015-1803: bdfReadCharacters: bailout if a char's bitmap cannot be read

    If the bdf parser failed to parse the data for the bitmap for any
    character, it would proceed with an invalid pointer to the bitmap
    data and later crash when trying to read the bitmap from that pointer.

CVE-2015-1804: bdfReadCharacters: ensure metrics fit into xCharInfo struct

    The bdf parser read metrics values as 32-bit integers, but stored
    them into 16-bit integers.  Overflows could occur in various operations

(snj)

2015-03-17 18:13:24 UTC MAIN commitmail json YAML

pull across bfdread.c fixes from libXfont 1.5.1, which fixes:

CVE-2015-1802: bdfReadProperties: property count needs range check

    The bdf parser reads a count for the number of properties defined in
    a font from the font file, and allocates arrays with entries for each
    property based on that count.  It never checked to see if that count
    was negative, or large enough to overflow when multiplied by the size
    of the structures being allocated, and could thus allocate the wrong
    buffer size, leading to out of bounds writes.

- CVE-2015-1803: bdfReadCharacters: bailout if a char's bitmap cannot be read

    If the bdf parser failed to parse the data for the bitmap for any
    character, it would proceed with an invalid pointer to the bitmap
    data and later crash when trying to read the bitmap from that pointer.

- CVE-2015-1804: bdfReadCharacters: ensure metrics fit into xCharInfo struct

    The bdf parser read metrics values as 32-bit integers, but stored
    them into 16-bit integers.  Overflows could occur in various operations
    leading to out-of-bounds memory access.

(mrg)

2015-03-17 18:11:17 UTC MAIN commitmail json YAML

2015-03-17 17:53:36 UTC netbsd-7 commitmail json YAML

2015-03-17 17:52:49 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by snj in ticket #590):
sys/external/bsd/drm2/i915drm/intel_gtt.c: revision 1.5
sys/external/bsd/drm2/drm/drm_drv.c: revision 1.15
sys/external/bsd/drm2/dist/drm/i915/i915_gem.c: revision 1.28
sys/external/bsd/drm2/dist/drm/nouveau/core/subdev/clock/nouveau_subdev_clock_nv50.c: revision 1.3
sys/dev/pci/agp_i810.c: revision 1.115
sys/dev/pci/agp_i810.c: revision 1.116
sys/external/bsd/drm2/include/drm/intel-gtt.h: revision 1.5
sys/dev/pci/agp_i810.c: revision 1.117
sys/external/bsd/drm2/drm/drm_gem_vm.c: revision 1.6
sys/dev/pci/agp_i810var.h: revision 1.6
Issue a write barrier after updating the GTT.
Linux never used to do this...until a month:
<a  rel="nofollow" href="https://bugs.freedesktop.org/show_bug.cgi?id=88191">https://bugs.freedesktop.org/show_bug.cgi?id=88191</a>
  commit 983d308cb8f602d1920a8c40196eb2ab6cc07bd2
  Author: Chris Wilson &lt;chris%chris-wilson.co.uk@localhost&gt;
  Date:  Mon Jan 26 10:47:10 2015 +0000
      agp/intel: Serialise after GTT updates
Include &lt;sys/atomic.h&gt; for membar_producer.
(Why didn't this fail in my build?)
Pass cache-related flags through to the GTT on pre-SNB devices.
I had assumed for ages this would increase the amount of caching and
thereby increase the chance of stale caches leading to rendering
glitches.  But apparently I was wrong, and failing to pass these
through was causing all sorts of problems!
Dedup the NetBSD portion of the code (ok Riastradh), no functional change.
Don't return events that are too large and leave them in the list.
Apply access control to gem mmap.
fix gcc is stupid.

(riz)

2015-03-17 17:20:55 UTC MAIN commitmail json YAML

If we own the FPU, don't take anymore undefined faults.  Instead generate
SIGILLs since we obviously don't understand the instruction.

(matt)

2015-03-17 12:20:02 UTC MAIN commitmail json YAML

__BEGIN_DECLS and __END_DECLS only exist if sys/cdefs.h was included.

(joerg)

2015-03-17 09:39:29 UTC MAIN commitmail json YAML

Change ffs to use vcache_new:
- Change ffs_valloc to return an inode number.
- Remove now obsolete UFS operations UFS_VALLOC and UFS_VFREE.
- Make ufs_makeinode private to ufs_vnops.c and pass vattr instead of mode.

(hannken)

2015-03-17 09:38:21 UTC MAIN commitmail json YAML

Add new operation "vcache_new()" to allocate and initialise a new
vnode/fsnode pair:

int
vcache_new(struct mount *mp, struct vnode *dvp, struct vattr *vap,
    kauth_cred_t cred, struct vnode **vpp)

where dvp is the (referenced) directory where we want to create the
new node, vap passes va_type, va_mode and possibly va_rdev and cred
gives the credentials to setup uid/guid.

The node returned from vcache_new() is referenced, fully initialised
and has link count zero.

Welcome to NetBSD 7.99.7

(hannken)

2015-03-17 09:27:09 UTC MAIN commitmail json YAML

2015-03-17 09:26:31 UTC MAIN commitmail json YAML

always print the child devices' address, print irq if not -1 and a driver
is actually attaching

(macallan)

2015-03-17 08:15:48 UTC MAIN commitmail json YAML

2015-03-17 08:14:30 UTC MAIN commitmail json YAML

add Ingenic Semiconductor Ltd.

(macallan)

2015-03-17 07:28:18 UTC MAIN commitmail json YAML

do as arm does and get rid of addresses in kernel config

(macallan)

2015-03-17 07:25:08 UTC MAIN commitmail json YAML

- keep a list of devices, addresses and interrupts in apbus.c
- pass irq numbers to devices
- reduce magic numbers in device drivers
- allow multiple instances of device drivers

(macallan)

2015-03-17 07:22:40 UTC MAIN commitmail json YAML

2015-03-17 01:58:29 UTC MAIN commitmail json YAML

fix the description of MKX11RADEONKMS, as pointed out in PR#49753.

(mrg)

2015-03-16 22:18:14 UTC MAIN commitmail json YAML

hook ODROID-C1 into build

(jmcneill)

2015-03-16 22:16:42 UTC MAIN commitmail json YAML

2015-03-16 21:37:35 UTC MAIN commitmail json YAML

sdhc stability improvements

(jmcneill)

2015-03-16 21:22:43 UTC netbsd-5 commitmail json YAML

2015-03-16 21:22:18 UTC netbsd-5-1 commitmail json YAML

2015-03-16 21:21:51 UTC netbsd-5-2 commitmail json YAML

2015-03-16 21:21:46 UTC nick-nhusb commitmail json YAML

Correct / improve some usb_syncmem calls.

(skrll)

2015-03-16 21:21:08 UTC netbsd-5-2 commitmail json YAML

usr.bin/gzip/Makefile                          patch
usr.bin/gzip/gzip.1                            1.20-1.24
usr.bin/gzip/gzip.c                            1.98-1.107
usr.bin/gzip/zuncompress.c                      1.7-1.8
distrib/utils/x_gzip/Makefile patch

Sync gzip core with HEAD.
[mrg, ticket #1951]

(bouyer)

2015-03-16 21:20:42 UTC netbsd-5-1 commitmail json YAML

usr.bin/gzip/Makefile                          patch
usr.bin/gzip/gzip.1                            1.20-1.24
usr.bin/gzip/gzip.c                            1.98-1.107
usr.bin/gzip/zuncompress.c                      1.7-1.8
distrib/utils/x_gzip/Makefile patch

Sync gzip core with HEAD.
[mrg, ticket #1951]

(bouyer)

2015-03-16 21:20:06 UTC netbsd-5 commitmail json YAML

usr.bin/gzip/Makefile                          patch
usr.bin/gzip/gzip.1                            1.20-1.24
usr.bin/gzip/gzip.c                            1.98-1.107
usr.bin/gzip/zuncompress.c                      1.7-1.8
distrib/utils/x_gzip/Makefile patch

Sync gzip core with HEAD.
[mrg, ticket #1951]

(bouyer)

2015-03-16 20:32:08 UTC MAIN commitmail json YAML

one more strike to the whack-a-mole game of arm flavors.

(christos)

2015-03-16 19:10:48 UTC MAIN commitmail json YAML

parse and print the HIDLANGIDBaseList attribute

(plunky)

2015-03-16 18:59:54 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #596):
distrib/sets/lists/tests/mi: revision 1.604
config(1): Fix test breakage
Now config(1) checks the content of $S/conf/Makefile.kern.inc.  Install it
into config(1) test directory to fix test.  Noticed by Martin Husemann.

(snj)

2015-03-16 16:42:27 UTC MAIN commitmail json YAML

2015-03-16 16:38:27 UTC nick-nhusb commitmail json YAML

Fix the part of the "no functional change" that was and shouldn't have
been.

EHCI_ITD_[GS]ET_BPTR were wrong.

(skrll)

2015-03-15 23:04:55 UTC netbsd-7 commitmail json YAML

580, 586-589, 591-596

(snj)

2015-03-15 23:01:46 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #596):
distrib/sets/lists/tests/mi: revision 1.604
tests/usr.bin/config/support/conf/Makefile: revision 1.2
tests/usr.bin/config/support/conf/Makefile.kern.inc: revision 1.1
config(1): Fix test breakage
Now config(1) checks the content of $S/conf/Makefile.kern.inc.  Install it
into config(1) test directory to fix test.  Noticed by Martin Husemann.

(snj)

2015-03-15 22:59:39 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by jmcneill in ticket #595):
sys/arch/arm/allwinner/awin_eth.c: revision 1.8
sys/arch/arm/allwinner/awin_gige.c: revision 1.22
sys/arch/arm/allwinner/awin_gpio.c: revision 1.17
sys/arch/arm/allwinner/awin_usb.c: revision 1.20
sprinkle __diagused to fix "no options DIAGNOSTIC" build

(snj)

2015-03-15 22:55:47 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by jmcneill in ticket #594):
sys/arch/arm/broadcom/bcm2835_vcaudio.c: revision 1.8, 1.9
sys/arch/arm/broadcom/files.bcm2835: revision 1.25
port-arm/49057: Raspberry Pi Audio volume control does not work
- Use software volume control for outputs.master/inputs.dac
- Previous volume control (for analog output only) is available on new
  outputs.headphones mixer control.
- Add an outputs.select enum to choose between "auto", "headphones", and
  "hdmi" outputs.
--
port-arm/49057: Raspberry Pi Audio volume control does not work
AUDS server messages expect volume to be expressed in units of 1/256 dB,
where we previously (incorrectly) treated it as as percentage. Map the
NetBSD audio level (0-255) to 20 steps (levels from FreeBSD bcm2835_audio.c)
and provide independent volume knobs for outputs.auto, outputs.hdmi, and
outputs.headphones.

(snj)

2015-03-15 22:54:03 UTC MAIN commitmail json YAML

Do invalidate the cache as RPI2 build with Clang can't fetch the memory
config otherwise.

(joerg)

2015-03-15 22:52:18 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by jmcneill in ticket #593):
sys/arch/evbarm/conf/RPI: revision 1.61
sys/arch/evbarm/conf/RPI2: revision 1.3
re-add ARM11_COMPAT_MMU, lost in the rpi2 shuffle
--
add no options ARM11_COMPAT_MMU

(snj)

2015-03-15 22:47:55 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by nonakap in ticket #592):
sys/dev/usb/if_run.c: revision 1.11
Add pmf hooks.

(snj)

2015-03-15 22:46:38 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by skrll in ticket #591):
sys/arch/arm/cortex/gic.c: revision 1.15
G/C armgic_last_priority

(snj)

2015-03-15 22:44:28 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by joerg in ticket #589):
usr.sbin/makemandb/makemandb.c: revision 1.28
MDOC_MAX is a valid token if the type is text. Adjust.

(snj)

2015-03-15 22:43:02 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by tron in ticket #587):
sys/fs/puffs/puffs_vfsops.c: revision 1.117
Remove debug printf

(snj)

2015-03-15 22:41:24 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by rmind in ticket #586):
sys/net/npf/npf_conn.c: revision 1.16
npf_conn_establish: fix the previous change - drop the reference on error.

(snj)

2015-03-15 22:39:58 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by joerg in ticket #580):
sys/external/bsd/compiler_rt/dist/lib/builtins/gcc_personality_v0.c: revision 1.2
Don't use __gcc_personality_sj0 on ARM.

(snj)

2015-03-15 21:18:04 UTC netbsd-5 commitmail json YAML

2015-03-15 21:17:44 UTC netbsd-5-1 commitmail json YAML

2015-03-15 21:17:27 UTC netbsd-5-2 commitmail json YAML

2015-03-15 21:15:22 UTC netbsd-5-2 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1951):
usr.bin/gzip/Makefile: patch
usr.bin/gzip/gzip.1: revisions 1.20-1.24
usr.bin/gzip/gzip.c: revisions 1.98-1.107
usr.bin/gzip/zuncompress.c: revisions 1.7-1.8
Sync gzip core with HEAD.

(snj)

2015-03-15 21:15:11 UTC netbsd-5-1 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1951):
usr.bin/gzip/Makefile: patch
usr.bin/gzip/gzip.1: revisions 1.20-1.24
usr.bin/gzip/gzip.c: revisions 1.98-1.107
usr.bin/gzip/zuncompress.c: revisions 1.7-1.8
Sync gzip core with HEAD.

(snj)

2015-03-15 21:15:01 UTC netbsd-5 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1951):
usr.bin/gzip/Makefile: patch
usr.bin/gzip/gzip.1: revisions 1.20-1.24
usr.bin/gzip/gzip.c: revisions 1.98-1.107
usr.bin/gzip/zuncompress.c: revisions 1.7-1.8
Sync gzip core with HEAD.

(snj)

2015-03-15 18:58:09 UTC MAIN commitmail json YAML

fix the big endian builds. Perhaps just remove the MAX define for everyone?

(christos)

2015-03-15 18:31:29 UTC MAIN commitmail json YAML

port-arm/49057: Raspberry Pi Audio volume control does not work

AUDS server messages expect volume to be expressed in units of 1/256 dB,
where we previously (incorrectly) treated it as as percentage. Map the
NetBSD audio level (0-255) to 20 steps (levels from FreeBSD bcm2835_audio.c)
and provide independent volume knobs for outputs.auto, outputs.hdmi, and
outputs.headphones.

(jmcneill)

2015-03-15 13:15:26 UTC MAIN commitmail json YAML

2015-03-15 11:52:47 UTC nick-nhusb commitmail json YAML

Only dump sqtds if we're not isochronous

(skrll)

2015-03-15 10:38:58 UTC MAIN commitmail json YAML

Reuse results of "bootpath" and "bootargs" from openfirmware
instead of calling openfirmware in each sysctl CPU_BOOT*.

This change reduces openfirmware calls from userland since sysctl
CPU_BOOTED_KERNEL is used in system commands such as pstat and
netstat.

(nakayama)