OpenBSD/src kN0KMLYsys/arch/arm64/stand/efiboot efiacpi.c conf.c

   Transplant the EL2 virtual timer interrupt into the ACPI device tree if
   it is provided in the GTDT table.
   Based on a diff from Marc Zyngier.

   ok jsg@
VersionDeltaFile
1.20+25-9sys/arch/arm64/stand/efiboot/efiacpi.c
1.54+2-2sys/arch/arm64/stand/efiboot/conf.c
+27-112 files

OpenBSD/src BAmEJPCusr.sbin/bgpd bgpd.c session.c

   If either tcp_md5_set() or pfkey_establish() fail then also fail the
   ongoing connect.

   The old graceful failure mode was added for strange cases like kernels
   without TCP MD5 support but there is honestly no good reason to limp along.
   The correct way to handle this on such broken systems is to edit the config
   and remove the auth settings. After that a bgpctl reload will fix the problem
   by skipping the TCP MD5 or IPSec setup.

   Reported by Frank Denis
   OK tb@
VersionDeltaFile
1.290+9-4usr.sbin/bgpd/bgpd.c
1.537+5-2usr.sbin/bgpd/session.c
+14-62 files

OpenBSD/src yNdK22Osys/arch/arm64/stand/efiboot dt_blob.S

   regen
VersionDeltaFile
1.3+857-265sys/arch/arm64/stand/efiboot/dt_blob.S
+857-2651 files

OpenBSD/src M48McmNsys/arch/arm64/stand/efiboot acpi.dts

   Add "interrupt-names" property to the timer node.

   ok jsg@
VersionDeltaFile
1.2+1-0sys/arch/arm64/stand/efiboot/acpi.dts
+1-01 files

OpenBSD/src xJf599Vusr.sbin/bgpd util.c

   In log_evpnaddr() the labellen for EVPN_ROUTE_TYPE_2 can either be 3 or 6.

   Currently only the first label is printed so only take the first 3 bytes
   of addr->labelstack to build the VNI. Do this by hand with a few shifts
   and or opertations instead of the memcpy and htonl() fumbling.

   EVPN is still experimental and disabled by default.
   Found by myself and also reported by Frank Denis
   OK denis@ tb@
VersionDeltaFile
1.102+5-4usr.sbin/bgpd/util.c
+5-41 files

OpenBSD/src h1zqy7Tlib/libcrypto cert.pem

   Sync cert.pem with mozilla roots; quite a few CA certificates were
   either removed or distrusted for web so are removed here.  ok tb@

   Common policies (moz, google, ca/b) are now to distrust roots with key
   material created before a certain time (currently 2008, this rolls
   forwards by 2 years each April until 2029 when it moves to '15 years
   from creation'), and also roots used for TLS are not permitted to be
   shared with other purposes (Secure Email, Code Signing, or others).

   This removes all root certificates from the following CA operators:

   -AffirmTrust
   -  /C=US/O=AffirmTrust/CN=AffirmTrust Commercial
   -  /C=US/O=AffirmTrust/CN=AffirmTrust Networking
   -  /C=US/O=AffirmTrust/CN=AffirmTrust Premium
   -  /C=US/O=AffirmTrust/CN=AffirmTrust Premium ECC

   -Firmaprofesional SA
   -  /C=ES/O=Firmaprofesional SA/2.5.4.97=VATES-A62634068/CN=FIRMAPROFESIONAL CA ROOT-A WEB

    [67 lines not shown]
VersionDeltaFile
1.35+1-1,146lib/libcrypto/cert.pem
+1-1,1461 files

OpenBSD/src nW8TkQQsbin/dhcpleased engine.c

   dhcpleased: Make sure to use VIS_NL with stravis()

   Various DHCP fields could include newlines, these were written to the lease file as-is. Nothing in base reads them, but it could confuse other tools.

   ok florian@
VersionDeltaFile
1.64+4-4sbin/dhcpleased/engine.c
+4-41 files

OpenBSD/src yC3jVgBsbin/dhcpleased dhcpleased.c dhcpleased.h

   dhcpleased: Change rdns_count to size_t

   Potentially on a 32-bit platform a crafted imsg could make the engine read 4 bytes of stack.

   ok florian@
VersionDeltaFile
1.43+4-4sbin/dhcpleased/dhcpleased.c
1.20+2-2sbin/dhcpleased/dhcpleased.h
+6-62 files

OpenBSD/src 9Qsmuvssbin/dhcpleased engine.c

   dhcpleased: Validate size of imsg_dhcp.len

   If the frontend manages to write something bad to imsg (bypassing the frontend's validation), where imsg_dhcp.len is > sizeof(imsg_dhcp.packet) it is possible for an OOB read to be forced in the engine. Make this fatal.

   ok florian@
VersionDeltaFile
1.63+4-2sbin/dhcpleased/engine.c
+4-21 files

OpenBSD/src SPnmCYZsbin/dhcpleased engine.c

   dhcpleased: Ensure imsg is zeroed in send_routes_withdraw.

   ok florian@
VersionDeltaFile
1.62+2-1sbin/dhcpleased/engine.c
+2-11 files

OpenBSD/src LvjNDn4sys/arch/amd64/amd64 cpu.c, sys/arch/amd64/include specialreg.h

   mitigate AMD Zen-2 operation cache corruption

   On Zen 2, the operation cache can be used to change instructions
   of a different privilege level.
   https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7052.html

   The mitigation is setting a chicken bit in an MSR.  This is not documented
   publicly, even in the security bulletin.  The value comes from a patch
   submitted to Linux by AMD employees.

   ok deraadt@ brynet@
VersionDeltaFile
1.206+7-1sys/arch/amd64/amd64/cpu.c
1.680+7-1sys/arch/i386/i386/machdep.c
1.123+4-1sys/arch/amd64/include/specialreg.h
1.87+4-1sys/arch/i386/include/specialreg.h
+22-44 files

OpenBSD/src UddTljbsys/kern sysv_shm.c

   Limit the maximum value of shminfo.shmseg to prevent `size' overflow in
   sys_shmat(). The default value of 128 is safe, but overflow could happen
   on 32 bits machine while the value of shminfo.shmseg was raised too high.

   Discussed with deraadt.
VersionDeltaFile
1.83+6-2sys/kern/sysv_shm.c
+6-21 files

OpenBSD/src t4YtPNrusr.sbin/bgpd rde_attr.c rde.h

   Add const void *data to attr_optadd()

   Doing this requires that attr_alloc() and attr_lookup() also use const.
   For attr_alloc() this is no problem but attr_lookup() is a bit more tricky
   since the data field in sturct attr is deliberatly not const.
   So instead use CH_LOCATE and a new attr_match() function to do the lookup
   with a helper type that uses const.

   OK tb@
VersionDeltaFile
1.145+33-9usr.sbin/bgpd/rde_attr.c
1.349+2-2usr.sbin/bgpd/rde.h
+35-112 files

OpenBSD/src 1hkt9Hyusr.sbin/bgpctl output.c output_json.c

   Add the extended message capability to the if statement that checks if
   the peer has anything enabled. Missed when adding ext_msg support.

   OK tb@
VersionDeltaFile
1.75+5-3usr.sbin/bgpctl/output.c
1.64+3-2usr.sbin/bgpctl/output_json.c
+8-52 files

OpenBSD/src 72WDOGzusr.sbin/bgpd chash.c chash.h

   Introduce ch_ext a struct holding the table an meta data pointers for
   the extendible hash.

   Doing this removes the need for handling two arrays in resize operations
   and also keeps the two pointers together. The code becomes simpler and
   with some reshuffling ch_table_resize() is now less problematic.

   The initial allocation of the extendible table is increased from one entry
   to two.

   OK tb@
VersionDeltaFile
1.12+68-76usr.sbin/bgpd/chash.c
1.7+5-7usr.sbin/bgpd/chash.h
+73-832 files

OpenBSD/src wxJ6n5Wsys/kern subr_disk.c

   In the disklabel check for specific fields with value 0, and return
   early before trying to check for a byte-swapped label.  This avoids
   a /0 in the byte-swapped partition check.
   ok krw, also discussed with krw
VersionDeltaFile
1.285+8-7sys/kern/subr_disk.c
+8-71 files

OpenBSD/src 7zqtlytusr.bin/sed compile.c

   Fix heap buffer overread in compile_delimited()

   OK deraadt
VersionDeltaFile
1.54+3-2usr.bin/sed/compile.c
+3-21 files

OpenBSD/src zg1DqWxusr.sbin/bgpd rde_prefix.c rde.h

   Do not fatal in pt_fill() instead return an error object that can never exist.

   pt_fill() is in some cases used by semi-trusted content (e.g. from
   bgpctl). The fatalx calls in that function are therefor a problem.

   This alters pt_fill to instead return a pt_entry object that can not
   exist in the tree. This error object is simply initalised with 0xff.

   Also if the prefixlen is too large for the address family just clip it down
   to the maximum (with a log message).

   In pt_add(), the only place a pt_fill() object would be added to the tree,
   check if the returned object is valid. There it is ok to fatal (at least
   for now) since the code previous to pt_add() should validate the prefix.

   Uniform some error messages and switch the prefixlen argument to u_int.

   OK tb@
VersionDeltaFile
1.61+53-22usr.sbin/bgpd/rde_prefix.c
1.348+5-5usr.sbin/bgpd/rde.h
+58-272 files

OpenBSD/src wpUl1Fdlib/libc/sys pledge.2

   strict localtime / zoneinfo __pledge_open() behaviours coming soon
VersionDeltaFile
1.84+3-3lib/libc/sys/pledge.2
+3-31 files

OpenBSD/src MOwmcOUsys/kern kern_ktrace.c

   The ktrace signal structure ktr_psig needs to be zero'd before filling in
   for providing to userland.
   from Stuart Thomas
VersionDeltaFile
1.116+2-1sys/kern/kern_ktrace.c
+2-11 files

OpenBSD/src 5oolTe3usr.sbin/bgpd rde_rib.c

   Link-local addresses for nexthops also need to check scope_id.

   scope_id, the gift that keeps on giving.

   OK tb@
VersionDeltaFile
1.293+12-2usr.sbin/bgpd/rde_rib.c
+12-21 files

OpenBSD/src XY8EJwGusr.sbin/bgpd rde.c

   Return error on unhandled imsg types in the adj-rib-out case.

   In rde_dump_ctx_new() the adj-rib-out case only covers some of the
   possible imsg types rde_dump_ctx_new() can be called with. So ship back an
   error instead of the fatalx() call.

   OK tb@
VersionDeltaFile
1.700+7-2usr.sbin/bgpd/rde.c
+7-21 files

OpenBSD/src 5Urk0kJusr.sbin/bgpd bgpd.c

   Add missing pfkey_remove() calls in error paths for RTR socket establishment.

   OK tb@
VersionDeltaFile
1.289+3-1usr.sbin/bgpd/bgpd.c
+3-11 files

OpenBSD/src jaYJvxyusr.bin/tmux tty-draw.c

   Fix a couple of bugs in tty_draw_line: do not loop forever if orphan
   padding appears, or if a wide character is trimmed at the right of the
   region. Much help with testing from qingliu at alauda dot io in GitHub
   issue 5024.
VersionDeltaFile
1.8+28-31usr.bin/tmux/tty-draw.c
+28-311 files

OpenBSD/src QmQZneosbin/pfctl pfctl.c

   avoid calling free() on an uninitialised pointer from an error path
   ok sashan@ henning@
VersionDeltaFile
1.403+2-2sbin/pfctl/pfctl.c
+2-21 files

OpenBSD/src UeYhgO3usr.bin/tmux tty-features.c

   Update supported features for Foot, from Meriel Luna Mittelbach in
   GutHub issue 5079.
VersionDeltaFile
1.36+8-3usr.bin/tmux/tty-features.c
+8-31 files

OpenBSD/src ZbNKqRrusr.sbin/bgpd parse.y

   Add missing memcpy calls for auth_key_in / out in merge_auth_conf()

   This was broken when refactoring the code for RTR and only affects
   manual IPSec setups which are very uncommon.

   OK tb@
VersionDeltaFile
1.496+5-1usr.sbin/bgpd/parse.y
+5-11 files

OpenBSD/src BibPA1Rusr.sbin/bgpd chash.c

   Error handling the double reallocarray in ch_table_resize() is tricky.

   In case of a realloc failure for the meta tables the ch_tables arrays
   was already successfully reallocated. Doing the free(tables) in the error
   path results in a use-after-free scenario and instead on error ch_tables
   just needs to be updated to this new table. Since the ch_level is not
   adjusted the next time, reallocarray will be called on a memory block
   that is already big enough which is a NOP and so this is safe.
   Further cleanup will follow.

   OK tb@
VersionDeltaFile
1.11+8-2usr.sbin/bgpd/chash.c
+8-21 files

OpenBSD/src VjhOP79usr.bin/tmux server-client.c

   Do not crash if set progress bar with no pane, from Dane Jensen.
VersionDeltaFile
1.457+2-2usr.bin/tmux/server-client.c
+2-21 files

OpenBSD/src izsbCXHsys/dev/sbus stp4020.c

   use nowake for sleep wait channel instead of an uninitialised
   stack variable

   avoids a -Wuninitialized-const-pointer warning with clang 22
   ok jca@
VersionDeltaFile
1.25+2-4sys/dev/sbus/stp4020.c
+2-41 files