ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 3752 by laffer1, Wed Feb 9 00:30:41 2011 UTC vs.
Revision 7625 by laffer1, Tue May 31 22:41:58 2016 UTC

# Line 1 | Line 1
1 < Updating Information for MidnightBSD users
1 > Updating Information for MidnightBSD users.
2  
3 + 20160531:
4 +        Fix four security issues with MidnightBSD.
5 +
6 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
7 +        struct before sending to userland in the linux emulation layer.
8 +
9 +        The compat 43 stat(2) system call exposes kernel stack to userland.
10 +
11 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
12 +        cpio directory traversal and an integer signedness error in the archive
13 +        write zip data routine.
14 +
15 +
16 + 20160528:
17 +        Fixed minor issues with mined(1) and msearch(1).
18 +
19 + 20160526:
20 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
21 +
22 +        Fix libpmc(3) build with clang compiler.
23 +
24 + 20160519:
25 +        Kernel Security updates
26 +
27 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
28 +        local user to overwrite a portion of the kernel memory.
29 +
30 +        Incorrect argument handling in sendmsg(2)
31 +
32 +        Incorrect argument handling in the socket code allows malicious local
33 +        user to overwrite large portion of the kernel memory.
34 +
35 + 20160505:
36 +        OpenSSL security patch
37 +
38 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
39 +        by making sure that always the same bytes are read and compared against
40 +        either the MAC or padding bytes. But it no longer checked that there was
41 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
42 +
43 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
44 +        Base64 encoding of binary data. [CVE-2016-2105]
45 +
46 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
47 +        believed that there can be no overflows in internal code due to this problem.
48 +        [CVE-2016-2106]
49 +
50 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
51 +        a short invalid encoding can casuse allocation of large amounts of memory
52 +        potentially consuming excessive resources or exhausting memory.
53 +        [CVE-2016-2109]
54 +
55 + 20160412:
56 +        0.8 stable branch created. Continue development as 0.9.
57 +
58 +        Fix several issues with wait6 system call addition.
59 +
60 + 20160409:
61 +        libmport now supports two new plist formats:
62 +        @(root,wheel,4775) myfile
63 +        @dir(root,wheel,775) mydir
64 +
65 +        On delete, absoluate paths are now handled properly.
66 +
67 + 20160317:
68 +        OpenSSH doesn't have the luck of the Irish.
69 +
70 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
71 +        run shell commands on the call to xauth.
72 +
73 +        Incorrect argument validation in sysarch(2)
74 +
75 +        A special combination of sysarch(2) arguments, specify a request to
76 +        uninstall a set of descriptors from the LDT.  The start descriptor
77 +        is cleared and the number of descriptors are provided.  Due to invalid
78 +        use of a signed intermediate value in the bounds checking during argument
79 +        validity verification, unbound zero'ing of the process LDT and adjacent
80 +        memory can be initiated from usermode.
81 +
82 +        Patch obtained from FreeBSD.
83 +
84 + 20160229:
85 +        top now displays information on ZFS arc cache.
86 +
87 + 20160228:
88 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
89 +
90 + 20160222:
91 +        Introduce pipe2 to linux emulation layer.
92 +
93 + 20160114:
94 +        OpenSSL
95 +
96 +        The signature verification routines will crash with a NULL pointer dereference
97 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
98 +        mask generation function parameter. [CVE-2015-3194]
99 +
100 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
101 +        memory. [CVE-2015-3195]
102 +
103 +        If PSK identity hints are received by a multi-threaded client then the values
104 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
105 +
106 +        Fix security on bsnmpd configuration file during installation.
107 +
108 +        TCP MD5 signature denial of service
109 +
110 +        A programming error in processing a TCP connection with both TCP_MD5SIG
111 +        and TCP_NOOPT socket options may lead to kernel crash.
112 +
113 +        SCTP
114 +
115 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
116 +        can lead to either a failed kernel assertion or to a NULL pointer
117 +        dereference.  In either case, a kernel panic will follow.
118 +
119 + 20160102:
120 +        Happy New Year
121 +
122 + 20151101:
123 +        Increase kern.ipc.somaxconn default to 256.
124 +
125 + 20151017:
126 +        Add initial statistics api to libmport and a driver to print
127 +        it in mport(1).
128 +
129 + 20151002:
130 +        Revised rpcbind(8) patch to fix issues with NIS
131 +
132 + 20150930:
133 +        In rpcbind(8), netbuf structures are copied directly, which would result in
134 +        two netbuf structures that reference to one shared address buffer.  When one
135 +        of the two netbuf structures is freed, access to the other netbuf structure
136 +        would result in an undefined result that may crash the rpcbind(8) daemon.
137 +
138 + 20150926:
139 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
140 +        to replace @exec and @unexec.  
141 +
142 +        pre exec runs afer pre-install scripts but before actual installation
143 +
144 +        post exec runs after install but before post install scripts and
145 +        pkg message.
146 +
147 +        pre unexec runs before pre uninstall scripts
148 +
149 +        post unexec runs before de-install scripts and after file removal.
150 +
151 + 20150917:
152 +        Fix kqueue write events for files > 2GB
153 +
154 + 20150825:
155 +        kernel:
156 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
157 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
158 +
159 +        openssh:
160 +        A programming error in the privileged monitor process of the sshd(8)
161 +        service may allow the username of an already-authenticated user to be
162 +        overwritten by the unprivileged child process.
163 +
164 +        A use-after-free error in the privileged monitor process of he sshd(8)
165 +        service may be deterministically triggered by the actions of a
166 +        compromised unprivileged child process.
167 +
168 +        A use-after-free error in the session multiplexing code in the sshd(8)
169 +        service may result in unintended termination of the connection.
170 +
171 + 20150818:
172 +        expat security fix
173 +
174 + 20150815:
175 +        libc changes:
176 +        setmode(3) now returns errno consistently on error.
177 +        libc will compile without error using clang
178 +
179 + 20150814:
180 +        wait6 system call added.
181 +
182 +        date(1) now handles non numeric numbers passed to -r
183 +        like GNU coreutils for improved compatibility.
184 +
185 + 20150811:
186 +        ata(4) AMD Hudson2 SATA controller support.
187 +        Intel lynxpoint SATA.
188 +
189 +        Fix some const warnings when building several device drivers
190 +        with llvm/clang.
191 +
192 +        Sync cas(4) with FreeBSD 9-stable.
193 +
194 +        Fix some minor issues with ath(4).
195 +
196 + 20150809:
197 +        xz 5.0.8
198 +
199 + 20150808:
200 +        libmport now logs installation and removal of packages to syslog.
201 +
202 + 20150805:
203 +        routed - fix a potential security issue where traffic from outside
204 +        the network can disrupt routing.
205 +
206 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
207 +        to run.
208 +
209 + 20150802:
210 +        jansson 2.7 library added. (libjansson is a JSON library in C)
211 +
212 + 20150728:
213 +        Heimdal 1.5.2 (kerberos implementation)
214 +
215 +        OpenSSL 1.0.1o
216 +
217 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
218 +
219 +        TCP Resassemly resource exhaustion bug:
220 +        There is a mistake with the introduction of VNET, which converted the
221 +        global limit on the number of segments that could belong to reassembly
222 +        queues into a per-VNET limit.  Because mbufs are allocated from a
223 +        global pool, in the presence of a sufficient number of VNETs, the
224 +        total number of mbufs attached to reassembly queues can grow to the
225 +        total number of mbufs in the system, at which point all network
226 +        traffic would cease.
227 +        Obtained from: FreeBSD 8
228 +
229 +        OpenSSH
230 +
231 +        Fix two security vulnerabilities:
232 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
233 +        offers a certificate. [CVE-2014-2653]
234 +
235 +        OpenSSH servers which are configured to allow password authentication
236 +        using PAM (default) would allow many password attempts. A bug allows
237 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
238 +
239 +
240 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
241 +
242 + 20150726:
243 +        BSD Sort updated
244 +
245 +        sqlite 3.8.10.2
246 +
247 + 20150725:
248 +        Import reallocarray from OpenBSD's libc.  
249 +
250 +        The reallocarray() function is similar to realloc() except it operates on
251 +        nmemb members of size size and checks for integer overflow in the
252 +        calculation nmemb * size.
253 +
254 + 20150722:
255 +        Fix a bug where TCP connections transitioning to LAST_ACK
256 +        state can get stuck. This can result in a denial of service.
257 +
258 + 20150715:
259 +        libmport now supports @shell and @sample in plists. This means that
260 +        a shell port can automatically add an entry to /etc/shells and remove
261 +        it upon uninstallation. For sample files, a copy is made without the
262 +        .sample extension if one does not exist and it is removed automatically
263 +        only if the md5 hash of the two files is the same.
264 +
265 + 20150709:
266 +        flex 2.5.39
267 +
268 + 20150702:
269 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
270 +        with zfs set compression=lz4 pool/path.
271 +
272 +        Verify it's working with
273 +        zfs get compressratio pool/path
274 +        du -h -s *
275 +
276 +        Note you must write new data when turning on compression to see
277 +        changes. Existing files are not compressed.
278 +
279 +        Note: While we used the same basic implementation of lz4 that
280 +        FreeBSD and OpenZFS uses, we did not yet implement features support
281 +        and the zfs version still reports 28. This may come in a future update
282 +        to ZFS.
283 +
284 + 20150621:
285 +        libmport now automatically stops services when deleting packages.
286 +
287 +        The package must have installed an rc.d script in /usr/local/etc
288 +        for this to work. This is equivalent to running service <name> onestop
289 +
290 + 20150618:
291 +        Sendmail
292 +
293 +        With the recent changes to OpenSSL to block 512 bit certificates,
294 +        sendmail can't connect with TLS to some servers.
295 +
296 +        Increase the default size to 1024 bit for client connections to
297 +        match the server configuration.
298 +
299 +        ZFS
300 +
301 +        Added ZFS TRIM support which is enabled by default. To disable
302 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
303 +
304 +        Creating new ZFS pools and adding new devices to existing pools
305 +        first performs a full device level TRIM which can take a significant
306 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
307 +        to disable this behaviour.
308 +
309 +        ZFS TRIM requires the underlying device support BIO_DELETE which
310 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
311 +        via CAM, which are typically supported by SSD's.
312 +
313 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
314 +        under kstat.zfs.misc.zio_trim.
315 +
316 +        rc.d
317 +
318 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
319 +        implies everything is mounted and ready to go.
320 +
321 +        Changed how ip6addressctl maps IPv6 on startup.
322 +
323 + 20150613:
324 +        tzdata 2015d
325 +
326 + 20150612:
327 +        OpenSSL 0.9.8zg
328 +
329 + 20150419:
330 +        MidnightBSD 0.6 stable branch created. Continue 0.7
331 +        development.
332 +
333 + 20150418:
334 +        sqlite 3.8.9
335 +
336 + 20150407:
337 +        Fix two security vulnerabilities:
338 +
339 +        The previous fix for IGMP had an overflow issue. This has been corrected.
340 +
341 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
342 +        suggested Current Hop Limit value of a link, which will replace
343 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
344 +        system.
345 +
346 + 20150319:
347 +        OpenSSL 0.9.8.zf
348 +
349 +        mksh R50e
350 +
351 +        Apple mDNSResponder 561.1.1
352 +
353 + 20150306:
354 +        Upgrade OpenSSL to 0.9.8ze
355 +
356 + 20150225:
357 +        Fix two security vulnerabilities.
358 +
359 +        1. BIND servers which are configured to perform DNSSEC validation and which
360 +        are using managed keys (which occurs implicitly when using
361 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
362 +        unpredictable behavior due to the use of an improperly initialized
363 +        variable.
364 +
365 +        CVE-2015-1349
366 +
367 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
368 +        in a buffer which is too small for the requested operation.
369 +
370 +        This can result in a DOS attack.
371 +
372 + 20141211:
373 +        Fix a security issue with file and libmagic that can allow
374 +        an attacker to create a denial of service attack on any
375 +        program that uses libmagic.
376 +
377 + 20141109:
378 +        Fix building perl during buildworld when the GDBM port is installed.
379 +
380 + 20141106:
381 +        tzdata 2014i
382 +
383 + 20141102:
384 +        serf 1.3.8
385 +
386 + 20141031:
387 +        tnftp 20141031 fixes a security vulnerability with tnftp,
388 +        CVE-2014-8517.
389 +
390 + 20141028:
391 +        OpenSSL 0.9.8zc
392 +
393 + 20141021:
394 +        Fix several security vulnerabilities in routed, rtsold,
395 +        and namei with respect to Capsicum sandboxes looking up
396 +        nonexistent path names and leaking memory.
397 +
398 +        The input path in routed(8) will accept queries from any source and
399 +        attempt to answer them.  However, the output path assumes that the
400 +        destination address for the response is on a directly connected
401 +        network.
402 +
403 +        Due to a missing length check in the code that handles DNS parameters,
404 +        a malformed router advertisement message can result in a stack buffer
405 +        overflow in rtsold(8).
406 +
407 + 20141011:
408 +        mksh R50d - fix field splitting regression and null
409 +        pointer dereference
410 +
411 +        xz 5.0.7
412 +
413 +        OpenSSH 6.6p1
414 +
415 + 20141004:
416 +        mksh R50c - security update for environment var bug with
417 +        foo vs foo+    
418 +
419 + 20141002:
420 +        sqlite 3.8.6
421 +
422 +        sudo 1.7.8 - some issues with the current version, but we're slowly
423 +        getting up to date.
424 +
425 + 20141001:
426 +        mksh R50b
427 +
428 +        libmport now supports plist commands @dir, @owner, @group, @mode.
429 +
430 +        sudo 1.7.6p2
431 +
432 + 20140916:
433 +        Fix a security issue with TCP SYN.
434 +
435 +        When a segment with the SYN flag for an already existing connection arrives,
436 +        the TCP stack tears down the connection, bypassing a check that the
437 +        sequence number in the segment is in the expected window.
438 +
439 + 20140909:
440 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
441 +        with some programs including Dovecot.
442 +
443 +        OpenSSL security patch:
444 +
445 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
446 +        to consume large amounts of memory. [CVE-2014-3506]
447 +
448 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
449 +        memory. [CVE-2014-3507]
450 +
451 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
452 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
453 +        the stack. [CVE-2014-3508]
454 +
455 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
456 +        a denial of service attack. [CVE-2014-3510]
457 +
458 + 20140902:
459 +        We're now 0.6-CURRENT
460 +
461 +        Update USB quirks to support K70 Corsair keyboard, and several
462 +        other devices.
463 +
464 + 20140827:
465 +        Perl 5.18.2
466 +
467 + 20140728:
468 +        Jails now run shutdown scripts.
469 +
470 + 20140710:
471 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
472 +        before sharing with userland.
473 +
474 + 20140701:
475 +        MKSH R50
476 +
477 + 20140630:
478 +        File 5.19
479 +
480 + 20140605:
481 +        Fix four security issues with OpenSSL
482 +
483 + 20140604:
484 +        Sendmail failed to properly set close-on-exec for open file descriptors.
485 +
486 +        ktrace page fault kernel trace entries were set to an incorrect size which resulted
487 +        in a leak of information.
488 +
489 + 20140430:
490 +        Fix a TCP reassembly bug that could result in a DOS attack
491 +        of the system. It may be possible to obtain portions
492 +        of kernel memory as well.
493 +
494 + 20140411:
495 +        Update zlib to 1.2.7
496 +
497 + 20140122:
498 +        Support for username with length 32. Previous limit was 16
499 +
500 + 20140114:
501 +        Fix two security vulnerabilities.
502 +
503 +        bsnmpd contains a stack overflow when sent certain queries.
504 +
505 +        bind 9.8 when using NSEC3-signed zones zones, will crash with special
506 +        crafted packets.
507 +
508 + 20131228:
509 +        Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
510 +
511 +        Updated em(4), igb(4) and ixgbe(4)
512 +
513 +        MidnightBSD now works with Z87 Intel chipsets.
514 +
515 + 20131207:
516 +        Remove sparc64 architecture. It hasn't been working for awhile
517 +        and it's not useful for desktops anymore.
518 +
519 + 20131205:
520 +        OpenSSH 6.4p1
521 +
522 + 20131203:
523 +        Perl 5.18.1 imported.
524 +
525 +        Update less to v458
526 +
527 + 20131130:
528 +        Remove named from base. We still include the client utilities for
529 +        now until replacements can be found.
530 +
531 + 20131004:
532 +        rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
533 +
534 + 20130917:
535 +        Support for 65,536 routing tables was added.  A new fib specific
536 +        field has been added to mbuf.  This is an increase from 16.
537 +
538 + 20130910:
539 +        Security updates: (kern.osreldate 5001)
540 +
541 +        nullfs(5)
542 +
543 +        The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
544 +        check whether the source and target of the link are both in the same
545 +        nullfs instance.  It is therefore possible to create a hardlink from a
546 +        location in one nullfs instance to a file in another, as long as the
547 +        underlying (source) filesystem is the same.
548 +
549 +        ifioctl
550 +
551 +        As is commonly the case, the IPv6 and ATM network layer ioctl request
552 +        handlers are written in such a way that an unrecognized request is
553 +        passed on unmodified to the link layer, which will either handle it or
554 +        return an error code.
555 +
556 +        Network interface drivers, however, assume that the SIOCSIFADDR,
557 +        SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
558 +        handled at the network layer, and therefore do not perform input
559 +        validation or verify the caller's credentials.  Typical link-layer
560 +        actions for these requests may include marking the interface as "up"
561 +        and resetting the underlying hardware.
562 +
563 + 20130824:
564 +        Fix a bug in sendmail 8.14.7 that interferes with how it
565 +        handles AAAA records interoperating with Microsoft DNS servers.
566 +        FreeBSD has already reported this to Sendmail and a fix
567 +        will be included in the next release.
568 +
569 +        Subversion 1.8.1 is now in the base system as a static
570 +        binary.  It has limited functionality, but can be used to
571 +        checkout/commit code.  It is named svnlite.
572 +
573 + 20130822:
574 +        Fix two security vulnerabilities.
575 +
576 +        Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
577 +        This could be exploited to read memory by a user process.
578 +
579 +        When initializing the SCTP state cookie being sent in INIT-ACK chunks,
580 +        a buffer allocated from the kernel stack is not completely initialized.
581 +
582 +        Import xz 5.0.4
583 +
584 +        Import sqlite 3.7.17
585 +
586 +        Import BIND 9.8.5-P2
587 +
588 + 20130814:
589 +        mksh R48 imported.
590 +
591 +        Sendmail 8.14.7 imported.
592 +
593 + 20130717:
594 +        libmport bug was fixed causing hash verification to fail.
595 +
596 +        virtio(4) imported from FreeBSD 9-stable. SCSI support not
597 +        included.
598 +
599 + 20130612:
600 +        RELENG_0_4 created for 0.4. Development continues on 0.5.
601 +
602 + 20130402:
603 +        Update BIND and OpenSSL to resolve security advisories.
604 +
605 + 20130305:
606 +        MKSH R44 imported.
607 +
608 + 20130213:
609 +        MKSH R42b imported
610 +
611 + 20130211:
612 +        MKSH R42 imported
613 +
614 + 20130125:
615 +        MKSH R41 imported
616 +
617 + 20130122:
618 +        OpenSSH 5.8p2 imported
619 +
620 +        SQLite 3.7.15.2 imported
621 +
622 +        Fixed a longstanding bug in libmport extrating new index files.
623 +
624 + 20120710:
625 +        BSD licensed sort imported from FreeBSD-CURRENT
626 +
627 +        For now, GNU sort is installed as gnusort, but it will
628 +        go away in time.
629 +
630 + 20120708:
631 +        tcsh 6.18.01 imported.
632 +
633 +        NetBSD's iconv imported.
634 +
635 +        libc gains strnlen(3), memrchr(3), stpncpy(3).
636 +
637 + 20120612:
638 +        BIND security update related to CVE-2012-1667.
639 +
640 +        Zero length resource records can cause BIND to crash resulting
641 +        in a DOS attack or information disclosure.
642 +
643 + 20120407:
644 +        mksh R40f (fixes regression)
645 +
646 + 20120328:
647 +        mksh R40e
648 +
649 +        Perl 5.14.2
650 +
651 + 20120229:
652 +        cpucontrol(8) and cpuctl(4) added from FreeBSD 7-stable.
653 +
654 + 20120209:
655 +        mDNSResponder 333.10 imported
656 +
657 + 20111227:
658 +        import raid5 module for GEOM, graid5(8)
659 +
660 +        This is experimental and known to use a lot of kernel
661 +        memory.
662 +
663 + 20111223:
664 +        telnetd: fix a root exploit from a fixed buffer that was not checked
665 +
666 +        pam: don't allow escape from policy path.  Exploitable in KDE, etc.
667 +
668 +        Fix pam_ssh module:
669 +
670 +        If the pam_ssh module is enabled, attackers may be able to gain access
671 +        to user accounts which have unencrypted SSH private keys.
672 +
673 +        This has to due with the way that openssl works.  It ignores unencrpted data.
674 +
675 +        Fix security issue with chroot and ftpd.
676 +
677 +        nsdispatch(3) doesn't know it's working in a chroot and some
678 +        operations can cause files to get reloaded causing a security
679 +        hole in things like ftpd.
680 +
681 + 20111217:
682 +        libdialog/dialog upgraded to an lgpl version. As it's not
683 +        backwardly compatable, include the old libdialog as libodialog
684 +
685 + 20111212:
686 +        mksh r40d imported
687 +
688 + 20111210:
689 +        re(4) and rl(4) updated to support new chips.
690 +
691 +        GEOM synced with FreeBSD 7-stable.
692 +
693 +        MidnightBSD GPT partition types created in sys/gpt.h and
694 +        setup in boot loader and GEOM.
695 +
696 +        amdsbwd(4) (amd watchdog for south bridge) updated to support
697 +        8xx series chipset.
698 +
699 + 20111207:
700 +        import bsd grep from FreeBSD/OpenBSD.
701 +
702 +        MK_BSD_GREP controls which grep is installed
703 +        as grep with the other as bsdgrep or gnugrep.
704 +
705 + 20111122:
706 +        mksh vR40c imported.
707 +
708 + 20111117:
709 +        BIND 9.6 ESV R5 P1
710 +
711 + 20111107:
712 +        tzdata 2011n
713 +
714 + 20111026:
715 +        mDNSResponder v320
716 +
717 +        BIND 9.6 ESV R5
718 +
719 + 20111022:
720 +        cflow 0.0.6 imported
721 +
722 + 20111020:
723 +        less v436 imported
724 +
725 +        amdsbwd(4) AMD southbridge watchdog
726 +
727 + 20111019:
728 +        awk 20110810 imported
729 +
730 +        et(4) Agere Gigabit Ethernet/Fast Ethernet driver added, but
731 +        not included in GENERIC kernel.  The kernel module needs
732 +        testing before we can include it in GENERIC.
733 +
734 +        intr_bind code ported to allow an IRQ to be bound to one
735 +        specific CPU core.
736 +
737 + 20111017:
738 +        Time Zone Data v. 2011l (Released 10 October 2011)
739 +
740 +        Updated list of countries (iso3166) to work with new timezone data.
741 +
742 + 20111015:
743 +        Introduce CPU Affinity in MidnightBSD. cpuset(1) can be used
744 +        to control which core or group of cores can be used for a given
745 +        process. Several new system calls were added to support this
746 +        functionality in the running kernel and for 32bit binary
747 +        compatibility on amd64.
748 +
749 +        The scheduler default has been changed to ULE in i386 and
750 +        amd64.  Changes were made to both schedulers (4BSD AND ULE)
751 +        for this feature.
752 +
753 +        This work is based on Jeff Roberson's FreeBSD 7.1 patches.
754 +
755 + 20111004:
756 +        Fix a problem with unix socket handling caused by the recent
757 +        patch to unix socket path handling. This allows network
758 +        apps to work under the linuxolator again.
759 +
760 + 20111001:
761 +        Import libfetch & fetch(1) from FreeBSD 9. Passive FTP is
762 +        now default and an environment variable must be set to use
763 +        active.
764 +
765 + 20110930:
766 +        Introduce quirks handling for several umass devices including
767 +        USB cameras.  Add workaround for Cyberpower UPS devices.
768 +
769 +        Bring in further bug fixes from FreeBSD and NetBSD for alc(4).
770 +        Stale ip/tcp header pointers are no longer used, lockups fixed
771 +        when network cable is unplugged on bootup, enable TX checksum
772 +        offloading.
773 +
774 +        Add a new man page for gcache(8), a useful geom class when
775 +        working with large raid3 sets.
776 +
777 +        Restore previous workaround for Cypress pata storage controller.
778 +
779 + 20110929:
780 +        Sync ath(4) with FreeBSD 7.3.
781 +
782 +        The following modules are no longer available, and should be
783 +        removed from loader.conf:
784 +        ath_hal ath_rate_amrr ath_rate_onoe ath_rate_sample
785 +
786 +        alc(4) would hibernate when a cable was unplugged and often
787 +        required bring the interface down and up to "wake up" so that
788 +        a connection could be established.  Disable hibernation.
789 +
790 + 20110928:
791 +        Fix security issues with gzip and compress related to .Z
792 +        files that are corrupted.
793 +
794 +        Fix path validation with unix domain sockets.
795 +
796 + 20110917:
797 +        Remove dependance on mports perl for generating releases as
798 +        it's in the base system.
799 +
800 + 20110914:
801 +        Import xz 5.0.3 with liblzma 5.0.3
802 +
803 + 20110813:
804 +        synced the sparc64 GENERIC kernel configuration with amd64.
805 +
806 + 20110806:
807 +        sqlite 3.7.7.1 imported
808 +
809 +        msearch(1), libmsearch and msearch.import added.  msearch(1) provides
810 +        a full text search command line tool.  libmsearch can also be used
811 +        to build a graphical based search in the future. You can enable
812 +        index building for msearch in periodic.conf or manually run the
813 +        /usr/libexec/msearch.index tool.  Full text indexes take considerable
814 +        space in /var.  I'm using approximately 500MB currently.
815 +
816 +        Fix a long standing bug with the periodic script to check package
817 +        versions.  This will be obsolete with mport though.
818 +
819 + 20110710:
820 +        kdb_enter_why added to MidnightBSD to allow the kernel debugger to
821 +        know why it's in use and thus script can be run.
822 +
823 +        Yet another problem with the perl manifest was fixed
824 +
825 + 20110709:
826 +        cpufreq(1) is a new utility to monitor CPU frequency which may change
827 +        with use of powerd(8) and cpufreq(4).
828 +
829 + 20110612:
830 +        Update mksh to R40
831 +
832 +        Catch up ObsoleteFiles.inc to remove Perl 5.10.x.  Good to run when
833 +        updating current (cd /usr/src && make check-old)
834 +
835 + 20110528:
836 +        Fix CVE-2011-1910 in BIND 9.6.x.  This affects caching resolvers.
837 +
838 + 20110526:
839 +        newfs:
840 +        Raised the default blocksize for UFS/FFS filesystems from
841 +        16K to 32K and the default fragment size from 2K to 4K.
842 +
843 +        This should slightly imporve performance on "advanced format"
844 +        hard drives such as the WD EARS drives. Drives of this type
845 +        have emulation modes that slow down with lower sizes.  Of course
846 +        the drive must still be aligned properly when using fdisk.
847 +
848 + 20110521:
849 +        mport tool now has a deleteall command.  This can be used to remove
850 +        all packages from a system.
851 +
852 +        A few bugs with the perl 5.14 import have been fixed.
853 +
854 + 20110518:
855 +        Perl 5.14.0
856 +
857 + 20110517:
858 +        Sendmail 8.14.5
859 +
860 + 20110314:
861 +        DRM/DRI code updated to support newer video cards. (FreeBSD 7.1)
862 +
863 +        cdevpriv wrappers added
864 +
865 +        nss_mdns hack introduced to work around linking problem.
866 +
867 +        dnsextd fixed after update to mDNSResponder code.
868 +
869 + 20110308:
870 +        Introduce liblzma & xz 5.0.1 to the base system
871 +
872 +        Patch for OpenSSL security issue CVE-2011-0014.
873 +
874 +        "OSREVISION 4004"
875 +
876 +        nsswitch module for multicast dns (nss_mdns) added.
877 +
878 +        tzdata2011c
879 +
880 + 20110220:
881 +        cam(4) syncronized with FreeBSD 7.3.
882 +
883 + 20110219:
884 +        amdtemp(4) updated to support sensors framework.
885 +
886 + 20110217:
887 +        Perl 5.10.1 imported
888 +
889 + 20110216:
890 +        Introduce igb(4) and split Intel Gigabit Ethernet adapters between
891 +        igb(4) and em(4).  Newer devices use igb(4).  The code has moved
892 +        to sys/dev/e1000 for both devices in the kernel. igb(4) has
893 +        been placed in GENERIC on i386 and amd64.
894 +
895 +        Update bfe(4) to support newer devices and WOL.
896 +
897 + 20110215:
898 +        age(4) added.
899 +
900   20110208:
901          BIND 9.6.3 which fixes a bug with DNSSEC records getting added.
902  
# Line 21 | Line 918 | Updating Information for MidnightBSD users
918   20110202:
919          tcsh 6.17.00
920  
921 <        file  5.05
921 >        file 5.05
922  
923   20110122:
924          Import it(4) and lm(4), with support for Super I/O hardware monitors. This
# Line 940 | Line 1837 | Contact Warner Losh if you have any questions about yo
1837   this document.
1838  
1839   $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
1840 < $MidnightBSD: src/UPDATING,v 1.111 2011/02/06 16:37:04 laffer1 Exp $
1840 > $MidnightBSD$

Comparing trunk/UPDATING (property cvs2svn:cvs-rev):
Revision 3752 by laffer1, Wed Feb 9 00:30:41 2011 UTC vs.
Revision 7625 by laffer1, Tue May 31 22:41:58 2016 UTC

# Line 1 | Line 0
1 1.112

Comparing trunk/UPDATING (property svn:keywords):
Revision 3752 by laffer1, Wed Feb 9 00:30:41 2011 UTC vs.
Revision 7625 by laffer1, Tue May 31 22:41:58 2016 UTC

# Line 0 | Line 1
1 + MidnightBSD=%H

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines