| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-EN-19:18.tzdata
Notes:
svn path=/releng/11.2/; revision=353915
|
| |
|
|
|
|
|
| |
Approved by: so
Notes:
svn path=/releng/11.2/; revision=351263
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:24.mqueuefs
Security: CVE-2019-5603
Notes:
svn path=/releng/11.2/; revision=351261
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:23.midi
Security: CVE-2019-5612
Notes:
svn path=/releng/11.2/; revision=351260
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:22.mbuf
Security: CVE-2019-5611
Notes:
svn path=/releng/11.2/; revision=351259
|
| |
|
|
|
|
|
| |
Approved by: so
Notes:
svn path=/releng/11.2/; revision=350649
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:19.mldv2
Security: CVE-2019-5608
Notes:
svn path=/releng/11.2/; revision=350644
|
| |
|
|
|
|
|
| |
Approved by: so
Notes:
svn path=/releng/11.2/; revision=350287
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:17.fd
Security: CVE-2019-5607
Notes:
svn path=/releng/11.2/; revision=350286
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:15.mqueuefs
Security: CVE-2019-5603
Notes:
svn path=/releng/11.2/; revision=350284
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:14.freebsd32
Security: CVE-2019-5605
Notes:
svn path=/releng/11.2/; revision=350283
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:13.pts
Security: CVE-2019-5606
Notes:
svn path=/releng/11.2/; revision=350282
|
| |
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-EN-19:13.mds
Notes:
svn path=/releng/11.2/; revision=350280
|
| |
|
|
|
|
|
|
| |
Approved by: so
Approved by: re (implicit)
Notes:
svn path=/releng/11.2/; revision=349626
|
| |
|
|
|
|
|
|
|
|
| |
Approved by: so
Approved by: re (implicit)
Security: FreeBSD-SA-19:11.cd_ioctl
Security: CVE-2019-5602
Notes:
svn path=/releng/11.2/; revision=349625
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:10.ufs
Security: CVE-2019-5601
Notes:
svn path=/releng/11.2/; revision=349623
|
| |
|
|
|
|
|
| |
Approved by: so
Notes:
svn path=/releng/11.2/; revision=347597
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:07.mds
Security: CVE-2018-12126
Security: CVE-2018-12127
Security: CVE-2018-12130
Security: CVE-2019-11091
Notes:
svn path=/releng/11.2/; revision=347595
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:06.pf
Security: CVE-2019-5598
Notes:
svn path=/releng/11.2/; revision=347593
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:05.pf
Security: CVE-2019-5597
Notes:
svn path=/releng/11.2/; revision=347591
|
| |
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-19:01.syscall
Notes:
svn path=/releng/11.2/; revision=343793
|
| |
|
|
|
|
|
|
|
|
| |
Submitted by: kib
Approved by: so
Security: CVE-2019-5595
Security: FreeBSD-SA-19:01.syscall
Notes:
svn path=/releng/11.2/; revision=343789
|
| |
|
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-EN-19:03.sqlite
Security: FreeBSD-EN-19:04.tzdata
Security: FreeBSD-EN-19:05.kqueue
Notes:
svn path=/releng/11.2/; revision=342901
|
| |
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-EN-19:05.kqueue
Notes:
svn path=/releng/11.2/; revision=342899
|
| |
|
|
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-18:15.bootpd
Security: FreeBSD-EN-18:16.ptrace
Security: FreeBSD-EN-18:17.vm
Security: FreeBSD-EN-18:18.zfs
Notes:
svn path=/releng/11.2/; revision=342232
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is caused by a deadlock between zil_commit() and zfs_zget()
Add a way for zfs_zget() to break out of the retry loop in the common case
PR: 229614, 231117
Submitted by: allanjude
Approved by: so
Security: FreeBSD-EN-18:18.zfs
Sponsored by: Klara Systems, The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=342226
|
| |
|
|
|
|
|
|
|
|
|
| |
PR: 231296
Submitted by: markj
Approved by: so
Security: FreeBSD-EN-18:17.vm
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=342225
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
This fixes a panic when attaching to an already-stopped process.
Also do some other clean ups for control flow of sendsig section.
Submitted by: markj
Approved by: so
Security: FreeBSD-EN-18:16.ptrace
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=342224
|
| |
|
|
|
|
|
|
|
|
|
| |
Submitted by: jhb
Reported by: Reno Robert
Approved by: so
Security: FreeBSD-SA-18:14.bhyve
Security: CVE-2018-17160
Notes:
svn path=/releng/11.2/; revision=341488
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-EN-18:13.icmp
Security: CVE-2018-17156
Notes:
svn path=/releng/11.2/; revision=341089
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Reported by: Jakub Jirasek, Secunia Research at Flexera
Approved by: so
Security: FreeBSD-SA-18:13.nfs
Security: CVE-2018-17157
Security: CVE-2018-17158
Security: CVE-2018-17159
Notes:
svn path=/releng/11.2/; revision=341088
|
| |
|
|
|
|
|
|
|
|
| |
Reported by: Thomas Barabosch, Fraunhofer FKIE
Approved by: so
Security: FreeBSD-EN-18:12.mem
Security: CVE-2018-17155
Notes:
svn path=/releng/11.2/; revision=338981
|
| |
|
|
|
|
|
|
|
|
| |
Reported by: Jakub Jirasek, Secunia Research at Flexera
Approved by: so
Security: FreeBSD-EN-18:11.listen
Security: CVE-2018-6925
Notes:
svn path=/releng/11.2/; revision=338980
|
| |
|
|
|
|
|
|
|
|
| |
Reported by: Thomas Barabosch, Fraunhofer FKIE
Approved by: so
Security: FreeBSD-EN-18:10.syscall
Security: CVE-2018-17154
Notes:
svn path=/releng/11.2/; revision=338979
|
| |
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-EN-18:09.ip
Notes:
svn path=/releng/11.2/; revision=338978
|
| |
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-EN-18:08.lazyfpu
Notes:
svn path=/releng/11.2/; revision=338607
|
| |
|
|
|
|
|
|
|
| |
Approved by: so
Security: FreeBSD-SA-18:12.elf
Security: CVE-2018-6924
Notes:
svn path=/releng/11.2/; revision=338606
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fix L1 Terminal Fault (L1TF) kernel information disclosure.
[SA-18:09.l1tf]
Fix resource exhaustion in IP fragment reassembly. [SA-18:10.ip]
Fix unauthenticated EAPOL-Key decryption vulnerability.
[SA-18:11.hostapd]
Approved by: so
Notes:
svn path=/releng/11.2/; revision=337828
|
| |
|
|
|
|
|
| |
Approved by: so
Notes:
svn path=/releng/11.2/; revision=337395
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Currently, the per-queue limit is a function of the receive buffer
size and the MSS. In certain cases (such as connections with large
receive buffers), the per-queue segment limit can be quite large.
Because we process segments as a linked list, large queues may not
perform acceptably.
The better long-term solution is to make the queue more efficient.
But, in the short-term, we can provide a way for a system
administrator to set the maximum queue size.
We set the default queue limit to 100. This is an effort to balance
performance with a sane resource limit. Depending on their
environment, goals, etc., an administrator may choose to modify this
limit in either direction.
Approved by: so
Security: FreeBSD-SA-18:08.tcp
Security: CVE-2018-6922
Notes:
svn path=/releng/11.2/; revision=337387
|
| |
|
|
|
|
|
|
|
|
|
|
| |
- Add the anticipated 11.2-RELEASE date to UPDATING.
- Set a static __FreeBSD_version.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=335510
svn path=/release/11.2.0/; revision=335563; tag=release/11.2.0
|
| |
|
|
|
|
|
|
| |
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=335197
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Enable eager FPU context switch on i386 and amd64.
CVE: CVE-2018-3665
MFC r335131
Remove printf() in #NM handler.
MFC r335132:
Reorganize code flow in fpudna()/npxdna().
Approved by: re (gjb)
Notes:
svn path=/releng/11.2/; revision=335196
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
MFC r334657:
Issue: Utility hangs when OCS_IOCTL_CMD_MGMT_GET_ALL called in
parallel on port 0 and port 1.
Fix: Using static structure for results is corrupting the second
ioctl request. Removed static for results structure.
Approved by: re (marius)
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=335163
|
| |
|
|
|
|
|
|
|
|
| |
r334860.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=334861
|
| |
|
|
|
|
|
|
|
|
| |
for amd64 ISOs is required.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=334859
|
| |
|
|
|
|
|
|
|
|
| |
r334839.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=334840
|
| |
|
|
|
|
|
|
|
|
| |
amd64 ISOs, pending a fix to be committed shortly.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=334838
|
| |
|
|
|
|
|
|
| |
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Notes:
svn path=/releng/11.2/; revision=334818
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Improve compliance with RFC 4895 and RFC 6458.
Silently dicard SCTP chunks which have been requested to be
authenticated but are received unauthenticated no matter if support
for SCTP authentication has been negotiated. This improves compliance
with RFC 4895.
When the application uses the SCTP_AUTH_CHUNK socket option to
request a chunk to be received in an authenticated way, enable
the SCTP authentication extension for the end-point. This improves
compliance with RFC 6458.
Discussed with: Peter Lei
Approved by: re (marius@)
Notes:
svn path=/releng/11.2/; revision=334802
|