DragonFlyBSD bugtracker: Issueshttps://bugs.dragonflybsd.org/https://bugs.dragonflybsd.org/favicon.ico?16293952082013-10-04T18:41:46ZDragonFlyBSD bugtracker
Redmine DragonFlyBSD - Bug #2593 (Closed): ipv6: mbuf memory leakhttps://bugs.dragonflybsd.org/issues/25932013-10-04T18:41:46Zlogan1loganaden@gmail.com
<p>From NetBSD:</p>
<p>--- ip6_mroute.c.orig 2013-10-04 11:37:53.000000000 <del>0700<br />+++ ip6_mroute.c 2013-10-04 11:38:14.000000000 -0700<br /><code>@ -475,7 +475,7 </code>@ ip6_mrouter_done(void)<br /> for (rte = rt</del>>mf6c_stall; rte != NULL; ) {<br /> struct rtdetq *n = rte->next;</p>
<p>- m_free(rte->m);<br />+ m_freem(rte->m);<br /> kfree(rte, M_MRTABLE);<br /> rte = n;<br /> }</p> DragonFlyBSD - Bug #2584 (Closed): RFC 5722: Drop overlapping fragment for IPv6https://bugs.dragonflybsd.org/issues/25842013-09-19T12:38:18Zlogan1loganaden@gmail.com
<p>Overlapping fragments weren't supported; make this explicit.</p>
<p>See RFC 5722:<br /><a class="external" href="http://tools.ietf.org/html/rfc5722">http://tools.ietf.org/html/rfc5722</a></p> DragonFlyBSD - Bug #2581 (Closed): IPv6 DoShttps://bugs.dragonflybsd.org/issues/25812013-08-21T07:27:19Zlogan1loganaden@gmail.com
<p>OpenBSD recently fixed an issue:</p>
<p>"A local denial of service is possible by an unprivileged user if the SIOCSIFADDR ioctl is performed upon an AF_INET6 socket with a specially crafted parameter."</p>
<p><a class="external" href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/005_in6.patch">http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/005_in6.patch</a></p>
<p>NetBSD as well fixed this issue:</p>
<p><a class="external" href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/in6.c?rev=1.104&content-type=text/x-cvsweb-markup&only_with_tag=MAIN">http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/in6.c?rev=1.104&content-type=text/x-cvsweb-markup&only_with_tag=MAIN</a></p>
<p>Feedback ?</p> DragonFlyBSD - Bug #2359 (Closed): patch diff to fix confusing behaviourhttps://bugs.dragonflybsd.org/issues/23592012-05-01T05:13:45Zlogan1loganaden@gmail.com
<p>When applying an erroneous patch with -C, patch prints messages<br />about saving to a rej file, which does not occur.</p>
<p>Attached diff fixes this behaviour</p> DragonFlyBSD - Submit #2299 (Closed): Prevent mapping to page 0 on pc32https://bugs.dragonflybsd.org/issues/22992012-02-04T19:57:22Zlogan1loganaden@gmail.com
<p>OpenBSD prevents mapping to page 0 to prevent certain<br />class of exploits.</p>
<p>It has been reported that it can break Wine.</p>
<p>I tested it on pc32.</p>
<p>Feedback welcomed.</p> DragonFlyBSD - Submit #2295 (Closed): error code of crypt-blowfishhttps://bugs.dragonflybsd.org/issues/22952012-01-30T19:19:49Zlogan1loganaden@gmail.com
<p>According to <a class="external" href="http://www.openwall.com/lists/oss-security/2011/11/15/3">http://www.openwall.com/lists/oss-security/2011/11/15/3</a>,<br />On encountering an error, it should return something else than ':'.</p>
<p>Upon discussion with sjg@, we decided to change to NULL. According to <br />the man page(crypt(3)), upon an error, NULL should be returned.</p>
<p>I tested by changing hash from sha to blf and generating new passwords.</p>