ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 6660 by laffer1, Fri Jun 6 01:26:03 2014 UTC vs.
Revision 9254 by laffer1, Mon Feb 20 01:17:33 2017 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20170219:
4 +        Add /dev/full device.
5 +
6 + 20170129:
7 +        add doas utility from OpenBSD.
8 +
9 + 20161105:
10 +        BIND 9.9.9-p4
11 +
12 +        OpenSSH 7.3p1
13 +
14 + 20161103:
15 +        OpenSSL security patch
16 +
17 +        Due to improper handling of alert packets, OpenSSL would consume an excessive
18 +        amount of CPU time processing undefined alert messages.
19 +
20 + 20161015:
21 +        libarchive 3.2.1
22 +
23 +        xz 5.2.2
24 +
25 + 20161013:
26 +        Sync ZFS code with Illuminos/FreeBSD 9.2. Added support for
27 +        feature flags, pool version 5000. This also includes some
28 +        bug fixes and performance optimizations.
29 +
30 + 20160925:
31 +        Import NetBSD vis(3) and unvis(3) as well as mtree.
32 +
33 +        one-true-awk 20121220
34 +
35 +        inetd now honors kern.ipc.somaxconn value.
36 +
37 +        netmap synced with FreeBSD 9.2
38 +
39 +        linuxolator now has dtrace probes.
40 +
41 +        bsdgrep now correctly handles -m to exclude only one file.
42 +
43 +        UFS file systems can now be resized in read-write mode due to the new
44 +        write suspension feature.
45 +
46 +        Basic support added for Intel Raid Recover Technology.
47 +
48 +        GMIRROR & GRAID3 now mark volumes clean on shutdown earlier to help with ZFS issues.
49 +
50 +        Highpoint hpt27xx now in GENERIC kernel.
51 +
52 + 20160923:
53 +        Security update for OpenSSL
54 +
55 +        A malicious client can send an excessively large OCSP Status Request extension.
56 +        If that client continually requests renegotiation, sending a large OCSP Status
57 +        Request extension each time, then there will be unbounded memory growth on the
58 +        server. [CVE-2016-6304]
59 +
60 +        An overflow can occur in MDC2_Update() either if called directly or through
61 +        the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
62 +        very large amounts of input data after a previous call to EVP_EncryptUpdate()
63 +        with a partial block then a length check can overflow resulting in a heap
64 +        corruption. [CVE-2016-6303]
65 +
66 +        If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
67 +        DoS attack where a malformed ticket will result in an OOB read which will
68 +        ultimately crash. [CVE-2016-6302]
69 +
70 +        The function BN_bn2dec() does not check the return value of BN_div_word().
71 +        This can cause an OOB write if an application uses this function with an
72 +        overly large BIGNUM. This could be a problem if an overly large certificate
73 +        or CRL is printed out from an untrusted source. TLS is not affected because
74 +        record limits will reject an oversized certificate before it is parsed.
75 +        [CVE-2016-2182]
76 +
77 +        The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
78 +        the total length the OID text representation would use and not the amount
79 +        of data written. This will result in OOB reads when large OIDs are presented.
80 +        [CVE-2016-2180]
81 +
82 +        Some calculations of limits in OpenSSL have used undefined pointer arithmetic.
83 +        This could cause problems with some malloc implementations. [CVE-2016-2177]
84 +
85 +        Operations in the DSA signing algorithm should run in constant time in order to
86 +        avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
87 +        a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
88 +
89 +        In a DTLS connection where handshake messages are delivered out-of-order those
90 +        messages that OpenSSL is not yet ready to process will be buffered for later
91 +        use. Under certain circumstances, a flaw in the logic means that those messages
92 +        do not get removed from the buffer even though the handshake has been completed.
93 +        An attacker could force up to approx. 15 messages to remain in the buffer when
94 +        they are no longer required. These messages will be cleared when the DTLS
95 +        connection is closed. The default maximum size for a message is 100k. Therefore
96 +        the attacker could force an additional 1500k to be consumed per connection.
97 +        [CVE-2016-2179]
98 +
99 +        A flaw in the DTLS replay attack protection mechanism means that records that
100 +        arrive for future epochs update the replay protection "window" before the MAC
101 +        for the record has been validated. This could be exploited by an attacker by
102 +        sending a record for the next epoch (which does not have to decrypt or have a
103 +        valid MAC), with a very large sequence number. This means that all subsequent
104 +        legitimate packets are dropped causing a denial of service for a specific
105 +        DTLS connection. [CVE-2016-2181]
106 +
107 +        In OpenSSL 1.0.2 and earlier some missing message length checks can result in
108 +        OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
109 +        DoS risk but this has not been observed in practice on common platforms.
110 +        [CVE-2016-6306]
111 +
112 + 20160918:
113 +        With the addition of auditdistd(8), a new auditdistd user is now
114 +        depended on during installworld.  "mergemaster -p" can be used to add
115 +        the user prior to installworld.
116 +
117 +        The VFS KBI was changed with the merge of several nullfs
118 +        optimizations and fixes.  All filesystem modules must be
119 +        recompiled.
120 +
121 + 20160916:
122 +        The random(4) support for the VIA hardware random number
123 +        generator (`PADLOCK') is no longer enabled unconditionally.
124 +        Add the PADLOCK_RNG option in the custom kernel config if
125 +        needed.  The GENERIC kernels on i386 and amd64 do include the
126 +        option, so the change only affects the custom kernel
127 +        configurations.
128 +
129 +        A new version of ZFS (pool version 5000) has been merged.
130 +        Starting with this version the old system of ZFS pool versioning
131 +        is superseded by "feature flags". This concept enables forward
132 +        compatibility against certain future changes in functionality of ZFS
133 +        pools. The first two read-only compatible "feature flags" for ZFS
134 +        pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
135 +        For more information read the new zpool-features(7) manual page.
136 +        Please refer to the "ZFS notes" section of this file for information
137 +        on upgrading boot ZFS pools.
138 +
139 + 20160906:
140 +        Add support for the MosChip MCS9904 four serial ports
141 +        controller.
142 +
143 +        Add support for walltimestamp in DTrace.
144 +
145 +        Various gdb improvments.
146 +
147 +        ZFS
148 +        Import the zio nop-write improvement from Illumos. To reduce I/O,
149 +        nop-write omits overwriting data if the checksum (cryptographically
150 +        secure) of new data matches the checksum of existing data.
151 +        It also saves space if snapshots are in use.
152 +
153 +        It currently works only on datasets with enabled compression, disabled
154 +        deduplication and sha256 checksums.
155 +
156 +        Add loader(8) tunable to enable/disable nopwrite functionality:
157 +        vfs.zfs.nopwrite_enabled
158 +
159 +        Introduce a new dataset aclmode setting "restricted" to protect ACL's
160 +        being destroyed or corrupted by a drive-by chmod.
161 +
162 +        New loader-only tunables:
163 +        vfs.zfs.sync_pass_deferred_free
164 +        vfs.zfs.sync_pass_dont_compress
165 +        vfs.zfs.sync_pass_rewrite
166 +
167 +        chkgrp(8) add support for q flag
168 +
169 +        Fix problem with the Samsung 840 PRO series SSD detection.
170 +        The device reports support for SATA Asynchronous Notification in its
171 +        IDENTIFY data, but returns error on attempt to enable that feature.
172 +        Make SATA XPT of CAM only report these errors, but not fail the device.
173 +
174 + 20160905:
175 +        Add a resource limit for the total number of kqueues
176 +        available to the user. Kqueue now saves the ucred of the
177 +        allocating thread, to correctly decrement the counter on close.
178 +        Based on FreeBSD SVN 256849
179 +
180 +        Import netcat from OpenBSD 5.2
181 +
182 + 20160904:
183 +        Introduced experimental TCP sysctls starting with
184 +        net.inet.tcp.experimental.initcwnd10
185 +
186 + 20160814:
187 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
188 +        in the release after the fact.
189 +
190 +        tzdata 2016a
191 +
192 + 20160811:
193 +        libdispatch 210
194 +
195 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
196 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
197 +        added WD Red drives.
198 +
199 +        Updated list of pci device vendors.
200 +
201 +        Updated list of usb devices.
202 +
203 + 20160807:
204 +        Implement several changes to libmport to fix some memory corruption issues.
205 +
206 + 20160806:
207 +        sqlite3 3.13.0
208 +
209 + 20160805:
210 +        Merged fixes for libmport that improve error handling when installing packages. Also
211 +        support mkdir -p like behavior for plist entries.
212 +
213 + 20160531:
214 +        Fix four security issues with MidnightBSD.
215 +
216 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
217 +        struct before sending to userland in the linux emulation layer.
218 +
219 +        The compat 43 stat(2) system call exposes kernel stack to userland.
220 +
221 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
222 +        cpio directory traversal and an integer signedness error in the archive
223 +        write zip data routine.
224 +
225 +
226 + 20160528:
227 +        Fixed minor issues with mined(1) and msearch(1).
228 +
229 + 20160526:
230 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
231 +
232 +        Fix libpmc(3) build with clang compiler.
233 +
234 + 20160519:
235 +        Kernel Security updates
236 +
237 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
238 +        local user to overwrite a portion of the kernel memory.
239 +
240 +        Incorrect argument handling in sendmsg(2)
241 +
242 +        Incorrect argument handling in the socket code allows malicious local
243 +        user to overwrite large portion of the kernel memory.
244 +
245 + 20160505:
246 +        OpenSSL security patch
247 +
248 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
249 +        by making sure that always the same bytes are read and compared against
250 +        either the MAC or padding bytes. But it no longer checked that there was
251 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
252 +
253 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
254 +        Base64 encoding of binary data. [CVE-2016-2105]
255 +
256 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
257 +        believed that there can be no overflows in internal code due to this problem.
258 +        [CVE-2016-2106]
259 +
260 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
261 +        a short invalid encoding can casuse allocation of large amounts of memory
262 +        potentially consuming excessive resources or exhausting memory.
263 +        [CVE-2016-2109]
264 +
265 + 20160412:
266 +        0.8 stable branch created. Continue development as 0.9.
267 +
268 +        Fix several issues with wait6 system call addition.
269 +
270 + 20160409:
271 +        libmport now supports two new plist formats:
272 +        @(root,wheel,4775) myfile
273 +        @dir(root,wheel,775) mydir
274 +
275 +        On delete, absoluate paths are now handled properly.
276 +
277 + 20160317:
278 +        OpenSSH doesn't have the luck of the Irish.
279 +
280 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
281 +        run shell commands on the call to xauth.
282 +
283 +        Incorrect argument validation in sysarch(2)
284 +
285 +        A special combination of sysarch(2) arguments, specify a request to
286 +        uninstall a set of descriptors from the LDT.  The start descriptor
287 +        is cleared and the number of descriptors are provided.  Due to invalid
288 +        use of a signed intermediate value in the bounds checking during argument
289 +        validity verification, unbound zero'ing of the process LDT and adjacent
290 +        memory can be initiated from usermode.
291 +
292 +        Patch obtained from FreeBSD.
293 +
294 + 20160229:
295 +        top now displays information on ZFS arc cache.
296 +
297 + 20160228:
298 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
299 +
300 + 20160222:
301 +        Introduce pipe2 to linux emulation layer.
302 +
303 + 20160114:
304 +        OpenSSL
305 +
306 +        The signature verification routines will crash with a NULL pointer dereference
307 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
308 +        mask generation function parameter. [CVE-2015-3194]
309 +
310 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
311 +        memory. [CVE-2015-3195]
312 +
313 +        If PSK identity hints are received by a multi-threaded client then the values
314 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
315 +
316 +        Fix security on bsnmpd configuration file during installation.
317 +
318 +        TCP MD5 signature denial of service
319 +
320 +        A programming error in processing a TCP connection with both TCP_MD5SIG
321 +        and TCP_NOOPT socket options may lead to kernel crash.
322 +
323 +        SCTP
324 +
325 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
326 +        can lead to either a failed kernel assertion or to a NULL pointer
327 +        dereference.  In either case, a kernel panic will follow.
328 +
329 + 20160102:
330 +        Happy New Year
331 +
332 + 20151101:
333 +        Increase kern.ipc.somaxconn default to 256.
334 +
335 + 20151017:
336 +        Add initial statistics api to libmport and a driver to print
337 +        it in mport(1).
338 +
339 + 20151002:
340 +        Revised rpcbind(8) patch to fix issues with NIS
341 +
342 + 20150930:
343 +        In rpcbind(8), netbuf structures are copied directly, which would result in
344 +        two netbuf structures that reference to one shared address buffer.  When one
345 +        of the two netbuf structures is freed, access to the other netbuf structure
346 +        would result in an undefined result that may crash the rpcbind(8) daemon.
347 +
348 + 20150926:
349 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
350 +        to replace @exec and @unexec.  
351 +
352 +        pre exec runs afer pre-install scripts but before actual installation
353 +
354 +        post exec runs after install but before post install scripts and
355 +        pkg message.
356 +
357 +        pre unexec runs before pre uninstall scripts
358 +
359 +        post unexec runs before de-install scripts and after file removal.
360 +
361 + 20150917:
362 +        Fix kqueue write events for files > 2GB
363 +
364 + 20150825:
365 +        kernel:
366 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
367 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
368 +
369 +        openssh:
370 +        A programming error in the privileged monitor process of the sshd(8)
371 +        service may allow the username of an already-authenticated user to be
372 +        overwritten by the unprivileged child process.
373 +
374 +        A use-after-free error in the privileged monitor process of he sshd(8)
375 +        service may be deterministically triggered by the actions of a
376 +        compromised unprivileged child process.
377 +
378 +        A use-after-free error in the session multiplexing code in the sshd(8)
379 +        service may result in unintended termination of the connection.
380 +
381 + 20150818:
382 +        expat security fix
383 +
384 + 20150815:
385 +        libc changes:
386 +        setmode(3) now returns errno consistently on error.
387 +        libc will compile without error using clang
388 +
389 + 20150814:
390 +        wait6 system call added.
391 +
392 +        date(1) now handles non numeric numbers passed to -r
393 +        like GNU coreutils for improved compatibility.
394 +
395 + 20150811:
396 +        ata(4) AMD Hudson2 SATA controller support.
397 +        Intel lynxpoint SATA.
398 +
399 +        Fix some const warnings when building several device drivers
400 +        with llvm/clang.
401 +
402 +        Sync cas(4) with FreeBSD 9-stable.
403 +
404 +        Fix some minor issues with ath(4).
405 +
406 + 20150809:
407 +        xz 5.0.8
408 +
409 + 20150808:
410 +        libmport now logs installation and removal of packages to syslog.
411 +
412 + 20150805:
413 +        routed - fix a potential security issue where traffic from outside
414 +        the network can disrupt routing.
415 +
416 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
417 +        to run.
418 +
419 + 20150802:
420 +        jansson 2.7 library added. (libjansson is a JSON library in C)
421 +
422 + 20150728:
423 +        Heimdal 1.5.2 (kerberos implementation)
424 +
425 +        OpenSSL 1.0.1o
426 +
427 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
428 +
429 +        TCP Resassemly resource exhaustion bug:
430 +        There is a mistake with the introduction of VNET, which converted the
431 +        global limit on the number of segments that could belong to reassembly
432 +        queues into a per-VNET limit.  Because mbufs are allocated from a
433 +        global pool, in the presence of a sufficient number of VNETs, the
434 +        total number of mbufs attached to reassembly queues can grow to the
435 +        total number of mbufs in the system, at which point all network
436 +        traffic would cease.
437 +        Obtained from: FreeBSD 8
438 +
439 +        OpenSSH
440 +
441 +        Fix two security vulnerabilities:
442 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
443 +        offers a certificate. [CVE-2014-2653]
444 +
445 +        OpenSSH servers which are configured to allow password authentication
446 +        using PAM (default) would allow many password attempts. A bug allows
447 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
448 +
449 +
450 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
451 +
452 + 20150726:
453 +        BSD Sort updated
454 +
455 +        sqlite 3.8.10.2
456 +
457 + 20150725:
458 +        Import reallocarray from OpenBSD's libc.  
459 +
460 +        The reallocarray() function is similar to realloc() except it operates on
461 +        nmemb members of size size and checks for integer overflow in the
462 +        calculation nmemb * size.
463 +
464 + 20150722:
465 +        Fix a bug where TCP connections transitioning to LAST_ACK
466 +        state can get stuck. This can result in a denial of service.
467 +
468 + 20150715:
469 +        libmport now supports @shell and @sample in plists. This means that
470 +        a shell port can automatically add an entry to /etc/shells and remove
471 +        it upon uninstallation. For sample files, a copy is made without the
472 +        .sample extension if one does not exist and it is removed automatically
473 +        only if the md5 hash of the two files is the same.
474 +
475 + 20150709:
476 +        flex 2.5.39
477 +
478 + 20150702:
479 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
480 +        with zfs set compression=lz4 pool/path.
481 +
482 +        Verify it's working with
483 +        zfs get compressratio pool/path
484 +        du -h -s *
485 +
486 +        Note you must write new data when turning on compression to see
487 +        changes. Existing files are not compressed.
488 +
489 +        Note: While we used the same basic implementation of lz4 that
490 +        FreeBSD and OpenZFS uses, we did not yet implement features support
491 +        and the zfs version still reports 28. This may come in a future update
492 +        to ZFS.
493 +
494 + 20150621:
495 +        libmport now automatically stops services when deleting packages.
496 +
497 +        The package must have installed an rc.d script in /usr/local/etc
498 +        for this to work. This is equivalent to running service <name> onestop
499 +
500 + 20150618:
501 +        Sendmail
502 +
503 +        With the recent changes to OpenSSL to block 512 bit certificates,
504 +        sendmail can't connect with TLS to some servers.
505 +
506 +        Increase the default size to 1024 bit for client connections to
507 +        match the server configuration.
508 +
509 +        ZFS
510 +
511 +        Added ZFS TRIM support which is enabled by default. To disable
512 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
513 +
514 +        Creating new ZFS pools and adding new devices to existing pools
515 +        first performs a full device level TRIM which can take a significant
516 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
517 +        to disable this behaviour.
518 +
519 +        ZFS TRIM requires the underlying device support BIO_DELETE which
520 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
521 +        via CAM, which are typically supported by SSD's.
522 +
523 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
524 +        under kstat.zfs.misc.zio_trim.
525 +
526 +        rc.d
527 +
528 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
529 +        implies everything is mounted and ready to go.
530 +
531 +        Changed how ip6addressctl maps IPv6 on startup.
532 +
533 + 20150613:
534 +        tzdata 2015d
535 +
536 + 20150612:
537 +        OpenSSL 0.9.8zg
538 +
539 + 20150419:
540 +        MidnightBSD 0.6 stable branch created. Continue 0.7
541 +        development.
542 +
543 + 20150418:
544 +        sqlite 3.8.9
545 +
546 + 20150407:
547 +        Fix two security vulnerabilities:
548 +
549 +        The previous fix for IGMP had an overflow issue. This has been corrected.
550 +
551 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
552 +        suggested Current Hop Limit value of a link, which will replace
553 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
554 +        system.
555 +
556 + 20150319:
557 +        OpenSSL 0.9.8.zf
558 +
559 +        mksh R50e
560 +
561 +        Apple mDNSResponder 561.1.1
562 +
563 + 20150306:
564 +        Upgrade OpenSSL to 0.9.8ze
565 +
566 + 20150225:
567 +        Fix two security vulnerabilities.
568 +
569 +        1. BIND servers which are configured to perform DNSSEC validation and which
570 +        are using managed keys (which occurs implicitly when using
571 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
572 +        unpredictable behavior due to the use of an improperly initialized
573 +        variable.
574 +
575 +        CVE-2015-1349
576 +
577 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
578 +        in a buffer which is too small for the requested operation.
579 +
580 +        This can result in a DOS attack.
581 +
582 + 20141211:
583 +        Fix a security issue with file and libmagic that can allow
584 +        an attacker to create a denial of service attack on any
585 +        program that uses libmagic.
586 +
587 + 20141109:
588 +        Fix building perl during buildworld when the GDBM port is installed.
589 +
590 + 20141106:
591 +        tzdata 2014i
592 +
593 + 20141102:
594 +        serf 1.3.8
595 +
596 + 20141031:
597 +        tnftp 20141031 fixes a security vulnerability with tnftp,
598 +        CVE-2014-8517.
599 +
600 + 20141028:
601 +        OpenSSL 0.9.8zc
602 +
603 + 20141021:
604 +        Fix several security vulnerabilities in routed, rtsold,
605 +        and namei with respect to Capsicum sandboxes looking up
606 +        nonexistent path names and leaking memory.
607 +
608 +        The input path in routed(8) will accept queries from any source and
609 +        attempt to answer them.  However, the output path assumes that the
610 +        destination address for the response is on a directly connected
611 +        network.
612 +
613 +        Due to a missing length check in the code that handles DNS parameters,
614 +        a malformed router advertisement message can result in a stack buffer
615 +        overflow in rtsold(8).
616 +
617 + 20141011:
618 +        mksh R50d - fix field splitting regression and null
619 +        pointer dereference
620 +
621 +        xz 5.0.7
622 +
623 +        OpenSSH 6.6p1
624 +
625 + 20141004:
626 +        mksh R50c - security update for environment var bug with
627 +        foo vs foo+    
628 +
629 + 20141002:
630 +        sqlite 3.8.6
631 +
632 +        sudo 1.7.8 - some issues with the current version, but we're slowly
633 +        getting up to date.
634 +
635 + 20141001:
636 +        mksh R50b
637 +
638 +        libmport now supports plist commands @dir, @owner, @group, @mode.
639 +
640 +        sudo 1.7.6p2
641 +
642 + 20140916:
643 +        Fix a security issue with TCP SYN.
644 +
645 +        When a segment with the SYN flag for an already existing connection arrives,
646 +        the TCP stack tears down the connection, bypassing a check that the
647 +        sequence number in the segment is in the expected window.
648 +
649 + 20140909:
650 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
651 +        with some programs including Dovecot.
652 +
653 +        OpenSSL security patch:
654 +
655 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
656 +        to consume large amounts of memory. [CVE-2014-3506]
657 +
658 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
659 +        memory. [CVE-2014-3507]
660 +
661 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
662 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
663 +        the stack. [CVE-2014-3508]
664 +
665 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
666 +        a denial of service attack. [CVE-2014-3510]
667 +
668 + 20140902:
669 +        We're now 0.6-CURRENT
670 +
671 +        Update USB quirks to support K70 Corsair keyboard, and several
672 +        other devices.
673 +
674 + 20140827:
675 +        Perl 5.18.2
676 +
677 + 20140728:
678 +        Jails now run shutdown scripts.
679 +
680 + 20140710:
681 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
682 +        before sharing with userland.
683 +
684 + 20140701:
685 +        MKSH R50
686 +
687 + 20140630:
688 +        File 5.19
689 +
690   20140605:
691          Fix four security issues with OpenSSL
692  

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines