Re: FreeBSD 5.3-BETA6 available

From: Matthias Andree <ma_at_dt.e-technik.uni-dortmund.de>
Date: Mon, 27 Sep 2004 17:11:41 +0200
Scott Long <scottl_at_FreeBSD.org> writes:

>> 1. /bin/sh "unset" is still in violation of IEEE Std 1003.1, 2004
>>    edition.  FIX IS AVAILABLE, bug has been open for many months, has
>>    persisted in BETA4 and 5.
>>    http://www.freebsd.org/cgi/query-pr.cgi?pr=standards/45738
>>    http://lists.freebsd.org/pipermail/freebsd-current/2004-September/037819.html
>
> I'll defer this to the standards folks.

Finally someone picks these up -- much appreciated, thank you very
much, it's a relief to be at least heard.

The fix for this has been pending for almost two years now, was filed
against 4.7, the fix is _trivial_ and was filed on 2002-11-26.

Given that this has been lying unattended for another ten days on
-standards already, can't we just commit this on probation and back out
as problems arise in BETA7?

I cannot imagine anyone relying on the bug in /bin/sh, but some test
scripts in third-party software stumble across this when trying to
sanitize their environment and need to resort to ugly workarounds such
as SOMEVAR= ; unset SOMEVAR.

The standard is clear, see 5th paragraph in DESCRIPTION of 
http://www.opengroup.org/onlinepubs/009695399/utilities/unset.html

(Julian Elischer inquired if someone had taken interest last Tuesday but
the report is still assigned to freebsd-bugs, so he hasn't claimed it
yet, so I presume he hasn't sufficient interest or commit permission to
address this.)

>> 2. tcpdump IPv6CP segfaults are still open as of BETA5, FIX IS
>> AVAILABLE:
>>    http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/71453
>>
>
> Looks pretty straight-forward.  Anyone want to import the fix from the
> tcpdump CVS tree?

I don't have a commit bit (nor am I asking for one but I'd take one if
someone insisted).

>> 3. data corruption on unaligned block access bug, kern/60313,
>>    is still open and unpatched AFAICS
>
> Is this actually an issue in FreeBSD 5?  In the audit trail of the PR,
> Bruce Evans seems to concede that GEOM checks block alignment
> properly.

I'll try again with a current beta and follow up on this with what I've
found; at the time I filed it, there was a problem with a different
symptom.

If someone else has a SCRATCH partition that can lose all data, (comment
out swap and reboot then you'll have one), a test program is part of
http://www.freebsd.org/cgi/query-pr.cgi?pr=60313 -- if someone checks
first, please Cc: me to avoid duplicated effort.

>> 4. NIS is still faulty in pretending users aren't there when in fact
>> NIS
>>    cannot tell if an account exists; bin/46866 is still open and unpatched
>
> While it's a compelling argument to follow the Solaris behavior, it's
> also a compelling argument to have a reasonable timeout on password
> lookups.

The problem is that the system cannot communicate the difference between
"temporary failure, try again" and "no such user", and can lead, for
instance, to a bogus _PERMANENT_ reject of a mail, which, in turn, can
trigger an unsubscription -- to name just one failure case I've
experienced.

>> 5. default inetd configuration denial of service bug, conf/33670, is
>> still
>>    open and unpatched AND A LAST CHANCE TO FIX NOW
>
> inetd is not turned on by default.

OK, I'll consider this closed. Feel free to close conf/33670; I'd
suggest that the inetd documentation mentions that an connection rate
limit doesn't bound the absolute client count and can result in DoS.

> What do OpenBSD and NetBSD do?
> What does Linux do with xinetd?

Depends on the distribution. I cannot say anything about OpenBSD or
NetBSD, SuSE Linux 9.1 doesn't automatically start services from inside
inetd or xinetd AFAICS.

>> 6. (portsmgr issue) no "yes or no" or whatsoever for my inquires
>> whether
>>    ports/72017 can be committed in spite of the freeze. It's a
>>    bugfix-only update.
>> Please state which of these will be fixed before 5.3-RELEASE and what
>> further help is needed with these.

Pav has claimed this and is waiting for portmgr approval which I already
asked about when filing the bug, no-one stirred themselves yet.

-- 
Matthias Andree

Encrypted mail welcome: my GnuPG key ID is 0x052E7D95 (PGP/MIME preferred)
Received on Mon Sep 27 2004 - 13:11:47 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:14 UTC