syslogd: patch for CVE-2014-3634

2014-10-12 Thread Tobias Stoeckmann
Hi, our syslogd is also vulnerable to rsyslog's CVE-2014-3634. The CVE is about parsing the priority from network clients. The priority boundary isn't properly checked, which could lead to out of bounds access later on. sysklogd's commit message is pretty extensive, so have a read here:

LibreSSL 2.1.0 released.

2014-10-12 Thread Bob Beck
We have released LibreSSL 2.1.0 - which should be arriving in the LIbreSSL directory of an OpenBSD mirror near you very soon. This release continues on with further work from after OpenBSD 5.6 code freeze. Our intention is to finalize LibreSSL 2.1 with OpenBSD 5.7 As noted before, we welcome

ps: remove redundant prototype

2014-10-12 Thread Martin Natano
The findvar() function in keyword.c contains a prototype of the vcmp() function, which is already declared further up in the same file. I'm not even sure that prototype is correct, as it fails to include the 'static' classifier (vcmp() is a static function). cheers, natano Index: keyword.c

Re: syslogd: patch for CVE-2014-3634

2014-10-12 Thread Philip Guenther
On Sun, Oct 12, 2014 at 4:12 AM, Tobias Stoeckmann tob...@stoeckmann.org wrote: our syslogd is also vulnerable to rsyslog's CVE-2014-3634. The CVE is about parsing the priority from network clients. The priority boundary isn't properly checked, which could lead to out of bounds access later

Re: syslogd: patch for CVE-2014-3634

2014-10-12 Thread Tobias Stoeckmann
On Sun, Oct 12, 2014 at 11:47:36AM -0700, Philip Guenther wrote: Have you actually managed to make it crash? I've already committed a check for this when this first came out, mapping out of bounds pri values to LOG_USER, and at that time no one was able to crash the code without the check...

Re: syslogd: patch for CVE-2014-3634

2014-10-12 Thread Stuart Henderson
On 2014/10/12 11:47, Philip Guenther wrote: On Sun, Oct 12, 2014 at 4:12 AM, Tobias Stoeckmann tob...@stoeckmann.org wrote: our syslogd is also vulnerable to rsyslog's CVE-2014-3634. The CVE is about parsing the priority from network clients. The priority boundary isn't properly checked,

em(4) fix for Intel I218 chip

2014-10-12 Thread Claudio Jeker
This seems to be enough to help em(4) in modern laptops like the X240 to no longer generate watchdog timeouts on high throughput. This should only affect I218 but tests on different em(4) devices would not hurt. -- :wq Claudio Index: if_em_hw.c

Re: improving OpenBSD's gmac.c...

2014-10-12 Thread Christian Weisgerber
Here's a cleaned-up diff. Briefly tested on amd64 sparc64. I'll do some more testing tomorrow. This already has mikeb@'s blessing. Index: regress/sys/crypto/gmac/Makefile === RCS file: /cvs/src/regress/sys/crypto/gmac/Makefile,v

Re: improving OpenBSD's gmac.c...

2014-10-12 Thread David Gwynne
dont you need endian.h to get bemtoh64 and htobem64? On 13 Oct 2014, at 7:57, Christian Weisgerber na...@mips.inka.de wrote: Here's a cleaned-up diff. Briefly tested on amd64 sparc64. I'll do some more testing tomorrow. This already has mikeb@'s blessing. Index:

Re: LibreSSL 2.1.0 released.

2014-10-12 Thread Jiri Navratil
Sun, Oct 12, 2014 at 07:36:02PM CEST, b...@openbsd.org napsal(a): We have released LibreSSL 2.1.0 - which should be arriving in the LIbreSSL directory of an OpenBSD mirror near you very soon. This release continues on with further work from after OpenBSD 5.6 code freeze. Our intention is to