OpenBSD/src FGNG4Zllib/libexpat Changes, lib/libexpat/lib xmlparse.c

   Backport libexpat regression fix from version 2.7.1.

   Relevant for OpenBSD are bug fixes #980 #989, other changes #986.

   errata/7.5/021_expat.patch
VersionDeltaFile
1.37.2.4+11-5lib/libexpat/lib/xmlparse.c
1.24.4.4+13-0lib/libexpat/Changes
+24-52 files

OpenBSD/src iZbF2QWlib/libexpat Changes, lib/libexpat/lib xmlparse.c

   Backport libexpat security fix from version 2.7.0.

   Relevant for OpenBSD are security fix #893 #973, other change #885,
   and bug fix #839 #841.  CVE-2024-8176

   this is errata/7.5/019_expat.patch.sig
VersionDeltaFile
1.37.2.3+423-160lib/libexpat/lib/xmlparse.c
1.24.4.3+20-0lib/libexpat/Changes
+443-1602 files

OpenBSD/src 3tOFsfVusr.bin/ssh packet.c sshconnect2.c

   Don't reply to PING in preauth phase or during KEX
   Reported by the Qualys Security Advisory team. ok markus@

   Fix cases where error codes were not correctly set
   Reported by the Qualys Security Advisory team. ok markus@

   from djm@

   this is errata/7.5/017_ssh.patch.sig
VersionDeltaFile
1.313.2.1+9-1usr.bin/ssh/packet.c
1.372.2.1+5-2usr.bin/ssh/sshconnect2.c
1.306.4.1+6-1usr.bin/ssh/ssh-agent.c
1.59.4.1+3-1usr.bin/ssh/krl.c
1.12.10.1+3-1usr.bin/ssh/ssh-sk-client.c
1.35.2.1+2-1usr.bin/ssh/sshsig.c
+28-76 files

OpenBSD/src 5iLBKnCsys/net pf_norm.c

   Fix pf fragment hole count.

   Fragment reassembly finishes when no holes are left in the fragment
   queue.  In certain overlap conditions, the hole counter was wrong
   and pf(4) created an incomplete IP packet.  Before adjusting the
   length, remove the overlapping fragment from the queue and insert
   it again afterwards.  pf_frent_remove() and pf_frent_insert() adjust
   the hole counter automatically.

   bug reported and fix tested by Lucas Aubard with Johan Mazel, Gilles
   Guette and Pierre Chifflier; OK claudio@

   this is errata/7.5/016_pffrag.patch
VersionDeltaFile
1.229.2.1+12-25sys/net/pf_norm.c
+12-251 files

OpenBSD/src hczMgCmsys/net if_wg.c

   Rewrite mbuf handling in wg(4).

   . Use m_align() to ensure that mbufs are packed towards the end so that
   additional headers don't require costly m_prepends.
   . Stop using m_copyback(), the way it was used there was actually wrong,
   instead just use memcpy since this is just a single mbuf.
   . Kill all usage of m_calchdrlen(), again this is not needed or can simply
   be m->m_pkthdr.len = m->m_len since all this code uses a single buffer.
   . In wg_encap() remove the min() with t->t_mtu when calculating plaintext_len
   and out_len. The code does not correctly cope with this min() at all with
   severe consequences.
   Initial diff by dhill@ who found the m_prepend() issue.
   Tested by various people.
   from claudio@; OK dhill@ mvs@ bluhm@ sthen@

   this is errata/7.5/015_wg.patch.sig
VersionDeltaFile
1.37.2.1+13-11sys/net/if_wg.c
+13-111 files

OpenBSD/src fA0UNrelib/libexpat Changes, lib/libexpat/examples element_declarations.c

   Backport libexpat security fixes from version 2.6.4.

   Relevant for OpenBSD are security fix #915 and other change #914.
   No library bump is necessary as existing error code has been reused.
   CVE-2024-50602

   OK tb@

   this is errata/7.5/014_expat.patch.sig
VersionDeltaFile
1.37.2.2+11-4lib/libexpat/lib/xmlparse.c
1.1.4.1+5-4lib/libexpat/examples/element_declarations.c
1.24.4.2+9-0lib/libexpat/Changes
+25-83 files

OpenBSD/src DwDfq1wsys/arch/arm64/dev aplsmc.c

   Set AP power state.  Fixes the SMC initialization on (at least) the M1
   MacBook with the latest system firmware.

   from kettenis@; ok patrick@, jsg@

   this is errata/7.5/013_aplsmc.patch.sig
VersionDeltaFile
1.25.4.1+7-1sys/arch/arm64/dev/aplsmc.c
+7-11 files

OpenBSD/src bb7Rzrosbin/unwind/libunbound/util/data msgencode.c, usr.sbin/unbound/util/data msgencode.c

   Fix unbound CVE-2024-8508, put a limit on resources used for handling
   DNS compression. OK florian
   from unbound 1.21.1.

   apply the CVE-2024-8508 fix from unbound (put a limit on resources used
   for handling DNS compression). OK florian

   from @sthen

   this is errata/7.5/011_unbound.patch.sig
VersionDeltaFile
1.7.4.1+46-31sbin/unwind/libunbound/util/data/msgencode.c
1.14.2.1+46-31usr.sbin/unbound/util/data/msgencode.c
+92-622 files

OpenBSD/src KERVlVisys/kern exec_elf.c

   Invalid pintables in ELF binaries can crash the kernel.
   from deraadt@; Fix from yufeng.gao at uq.edu.au

   this is errata/7.5/010_elf.patch.sig
VersionDeltaFile
1.185.2.1+4-2sys/kern/exec_elf.c
+4-21 files

OpenBSD/src PIEj8gFsys/isofs/cd9660 cd9660_vnops.c, sys/isofs/udf udf_vnops.c

   Ensure that file names passed back by readdir do not include a '/'
   character. The '/' char is the path separator and is not allowed in
   any filename.

   NFS specific report by Apple Security Engineering and Architecture (SEAR).

   Input from guenther@ and millert@
   from claudio@; OK beck@ miod@

   msdos already transfroms for Windows long names a '/' char into '?'.
   Do the same for the 8.3 case as well.

   This is not ideal since now it is possible that two files in the same
   directory have the same name but the msdos code already does a lot of
   this and so the problem already exists.

   from claudio@; OK beck@ miod@

   Do a basic sanity check that dirents returned via fuse are kind of sane.

    [9 lines not shown]
VersionDeltaFile
1.67.4.1+32-1sys/miscfs/fuse/fuse_vnops.c
1.70.4.1+7-1sys/isofs/udf/udf_vnops.c
1.46.10.1+6-2sys/ufs/ext2fs/ext2fs_lookup.c
1.26.6.1+6-1sys/tmpfs/tmpfs_subr.c
1.193.4.1+6-1sys/nfs/nfs_vnops.c
1.95.4.1+6-1sys/isofs/cd9660/cd9660_vnops.c
+63-73 files not shown
+77-129 files

OpenBSD/src 9XNx6zKsys/nfs nfsm_subs.h nfs_socket.c

   After calling m_freem() on nmi_mrep (or nmi_mreq) set the pointer to NULL.

   Only do this if struct nfsm_info doesn't have local scope.
   In some cases the caller would perfrom another m_freem and double free
   the mbuf and Bad Things(TM) would happen.

   from claudio@; Reported by Claes M Nyberg on bugs@; with & ok miod@

   nfsm_srvnamesiz() may set up an NFSERR_NAMETOL error, which nfsm_reply() would
   consider as not tragic enough to abort the operation, in order to batch error
   replies.

   This would end up invoking nfs_namei() using the length obtained from
   the NFS request, and Bad Things(TM) would happen if this value is larger
   than MAXPATHLEN.

   from miod@; Reported by Claes M Nyberg on bugs@; tweaks & ok claudio@

   this is errata/7.5/008_nfs.patch.sig
VersionDeltaFile
1.47.22.1+25-8sys/nfs/nfsm_subs.h
1.145.2.1+2-1sys/nfs/nfs_socket.c
+27-92 files

OpenBSD/src THQ5df7lib/libexpat Changes, lib/libexpat/lib xmlparse.c

   Backport libexpat security fixes from version 2.6.3.

   Relevant for OpenBSD are security fixes #887 #890 #888 #891 #889
   #892.  No library bump necessary.
   CVE-2024-45490 CVE-2024-45491 CVE-2024-45492

   OK tb@

   errata/7.5/007_expat.patch
VersionDeltaFile
1.24.4.1+27-0lib/libexpat/Changes
1.37.2.1+25-0lib/libexpat/lib/xmlparse.c
+52-02 files

OpenBSD/src mTSkeSIusr.sbin/cron entry.c

   Fix CVE-2024-43688, buffer underflow for very large step values

   In get_number(), reject values that are so large that they are
   interpreted as negative numbers.  In set_range(), step values smaller
   than one or larger than the "stop" value are ignored.  This prevents
   bit_nset() from being called with out-of-range values.

   from millert@; Bug found by Dave G. of Supernetworks.

   this is errata/7.5/006_cron.patch.sig
VersionDeltaFile
1.59.4.1+6-3usr.sbin/cron/entry.c
+6-31 files

OpenBSD/src d1nYZCUusr.bin/sndiod sock.c

   sndiod: Fix insufficent check of input from clients

   Fixes possible sndiod(8) crashes caused by a global table overread
   triggered by the client.

   Found and analysed by Henry Ford <henryfordkjv at gmail.com>, thanks!

   from ratchov@; OK bluhm@, help from millert@, mlarkin@

   this is errata/7.5/005_sndiod.patch.sig
VersionDeltaFile
1.47.6.1+3-3usr.bin/sndiod/sock.c
+3-31 files

OpenBSD/src HYiCSZ1usr.sbin/bgpd rde_prefix.c

   When filling prefixes with pt_writebuf() keep 2 bytes reserved in the
   withdraw case. Those bytes are needed for the attribute length field.
   Without this withdraw messages can become overfull and are dropped
   without notice.

   Problem found and fix tested by denis@
   from claudio@; OK denis@ tb@

   this is errata/7.5/004_bgpd.patch.sig
VersionDeltaFile
1.50.2.1+4-1usr.sbin/bgpd/rde_prefix.c
+4-11 files

OpenBSD/src 1AHAeSmlib/libcrypto/lhash lhash.c

   A missing bounds check could lead to a crash due to dereferencing a zero-sized
   allocation.

   this is errata/7.5/003_libcrypto.patch.sig
VersionDeltaFile
1.22.2.1+4-2lib/libcrypto/lhash/lhash.c
+4-21 files

OpenBSD/src 44XCYu5distrib/alpha/miniroot Makefile

   OpenBSD 7.5 Errata 002:
   Install media for alpha architecture was broken due to strip(1) bug.

   ok deraadt@
VersionDeltaFile
1.28.4.1+1-2distrib/alpha/miniroot/Makefile
+1-21 files

OpenBSD/src 0SU7m2Qsys/conf newvers.sh

   7.5-stable
VersionDeltaFile
1.202.2.1+3-3sys/conf/newvers.sh
+3-31 files