ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 4476 by laffer1, Wed Dec 28 00:46:31 2011 UTC vs.
Revision 7741 by laffer1, Mon Aug 15 02:47:04 2016 UTC

# Line 1 | Line 1
1 < Updating Information for MidnightBSD users
1 > Updating Information for MidnightBSD users.
2  
3 + 20160814:
4 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
5 +        in the release after the fact.
6 +
7 +        tzdata 2016a
8 +
9 + 20160811:
10 +        libdispatch 210
11 +
12 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
13 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
14 +        added WD Red drives.
15 +
16 +        Updated list of pci device vendors.
17 +
18 +        Updated list of usb devices.
19 +
20 + 20160807:
21 +        Implement several changes to libmport to fix some memory corruption issues.
22 +
23 + 20160806:
24 +        sqlite3 3.13.0
25 +
26 + 20160805:
27 +        Merged fixes for libmport that improve error handling when installing packages. Also
28 +        support mkdir -p like behavior for plist entries.
29 +
30 + 20160531:
31 +        Fix four security issues with MidnightBSD.
32 +
33 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
34 +        struct before sending to userland in the linux emulation layer.
35 +
36 +        The compat 43 stat(2) system call exposes kernel stack to userland.
37 +
38 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
39 +        cpio directory traversal and an integer signedness error in the archive
40 +        write zip data routine.
41 +
42 +
43 + 20160528:
44 +        Fixed minor issues with mined(1) and msearch(1).
45 +
46 + 20160526:
47 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
48 +
49 +        Fix libpmc(3) build with clang compiler.
50 +
51 + 20160519:
52 +        Kernel Security updates
53 +
54 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
55 +        local user to overwrite a portion of the kernel memory.
56 +
57 +        Incorrect argument handling in sendmsg(2)
58 +
59 +        Incorrect argument handling in the socket code allows malicious local
60 +        user to overwrite large portion of the kernel memory.
61 +
62 + 20160505:
63 +        OpenSSL security patch
64 +
65 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
66 +        by making sure that always the same bytes are read and compared against
67 +        either the MAC or padding bytes. But it no longer checked that there was
68 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
69 +
70 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
71 +        Base64 encoding of binary data. [CVE-2016-2105]
72 +
73 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
74 +        believed that there can be no overflows in internal code due to this problem.
75 +        [CVE-2016-2106]
76 +
77 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
78 +        a short invalid encoding can casuse allocation of large amounts of memory
79 +        potentially consuming excessive resources or exhausting memory.
80 +        [CVE-2016-2109]
81 +
82 + 20160412:
83 +        0.8 stable branch created. Continue development as 0.9.
84 +
85 +        Fix several issues with wait6 system call addition.
86 +
87 + 20160409:
88 +        libmport now supports two new plist formats:
89 +        @(root,wheel,4775) myfile
90 +        @dir(root,wheel,775) mydir
91 +
92 +        On delete, absoluate paths are now handled properly.
93 +
94 + 20160317:
95 +        OpenSSH doesn't have the luck of the Irish.
96 +
97 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
98 +        run shell commands on the call to xauth.
99 +
100 +        Incorrect argument validation in sysarch(2)
101 +
102 +        A special combination of sysarch(2) arguments, specify a request to
103 +        uninstall a set of descriptors from the LDT.  The start descriptor
104 +        is cleared and the number of descriptors are provided.  Due to invalid
105 +        use of a signed intermediate value in the bounds checking during argument
106 +        validity verification, unbound zero'ing of the process LDT and adjacent
107 +        memory can be initiated from usermode.
108 +
109 +        Patch obtained from FreeBSD.
110 +
111 + 20160229:
112 +        top now displays information on ZFS arc cache.
113 +
114 + 20160228:
115 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
116 +
117 + 20160222:
118 +        Introduce pipe2 to linux emulation layer.
119 +
120 + 20160114:
121 +        OpenSSL
122 +
123 +        The signature verification routines will crash with a NULL pointer dereference
124 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
125 +        mask generation function parameter. [CVE-2015-3194]
126 +
127 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
128 +        memory. [CVE-2015-3195]
129 +
130 +        If PSK identity hints are received by a multi-threaded client then the values
131 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
132 +
133 +        Fix security on bsnmpd configuration file during installation.
134 +
135 +        TCP MD5 signature denial of service
136 +
137 +        A programming error in processing a TCP connection with both TCP_MD5SIG
138 +        and TCP_NOOPT socket options may lead to kernel crash.
139 +
140 +        SCTP
141 +
142 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
143 +        can lead to either a failed kernel assertion or to a NULL pointer
144 +        dereference.  In either case, a kernel panic will follow.
145 +
146 + 20160102:
147 +        Happy New Year
148 +
149 + 20151101:
150 +        Increase kern.ipc.somaxconn default to 256.
151 +
152 + 20151017:
153 +        Add initial statistics api to libmport and a driver to print
154 +        it in mport(1).
155 +
156 + 20151002:
157 +        Revised rpcbind(8) patch to fix issues with NIS
158 +
159 + 20150930:
160 +        In rpcbind(8), netbuf structures are copied directly, which would result in
161 +        two netbuf structures that reference to one shared address buffer.  When one
162 +        of the two netbuf structures is freed, access to the other netbuf structure
163 +        would result in an undefined result that may crash the rpcbind(8) daemon.
164 +
165 + 20150926:
166 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
167 +        to replace @exec and @unexec.  
168 +
169 +        pre exec runs afer pre-install scripts but before actual installation
170 +
171 +        post exec runs after install but before post install scripts and
172 +        pkg message.
173 +
174 +        pre unexec runs before pre uninstall scripts
175 +
176 +        post unexec runs before de-install scripts and after file removal.
177 +
178 + 20150917:
179 +        Fix kqueue write events for files > 2GB
180 +
181 + 20150825:
182 +        kernel:
183 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
184 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
185 +
186 +        openssh:
187 +        A programming error in the privileged monitor process of the sshd(8)
188 +        service may allow the username of an already-authenticated user to be
189 +        overwritten by the unprivileged child process.
190 +
191 +        A use-after-free error in the privileged monitor process of he sshd(8)
192 +        service may be deterministically triggered by the actions of a
193 +        compromised unprivileged child process.
194 +
195 +        A use-after-free error in the session multiplexing code in the sshd(8)
196 +        service may result in unintended termination of the connection.
197 +
198 + 20150818:
199 +        expat security fix
200 +
201 + 20150815:
202 +        libc changes:
203 +        setmode(3) now returns errno consistently on error.
204 +        libc will compile without error using clang
205 +
206 + 20150814:
207 +        wait6 system call added.
208 +
209 +        date(1) now handles non numeric numbers passed to -r
210 +        like GNU coreutils for improved compatibility.
211 +
212 + 20150811:
213 +        ata(4) AMD Hudson2 SATA controller support.
214 +        Intel lynxpoint SATA.
215 +
216 +        Fix some const warnings when building several device drivers
217 +        with llvm/clang.
218 +
219 +        Sync cas(4) with FreeBSD 9-stable.
220 +
221 +        Fix some minor issues with ath(4).
222 +
223 + 20150809:
224 +        xz 5.0.8
225 +
226 + 20150808:
227 +        libmport now logs installation and removal of packages to syslog.
228 +
229 + 20150805:
230 +        routed - fix a potential security issue where traffic from outside
231 +        the network can disrupt routing.
232 +
233 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
234 +        to run.
235 +
236 + 20150802:
237 +        jansson 2.7 library added. (libjansson is a JSON library in C)
238 +
239 + 20150728:
240 +        Heimdal 1.5.2 (kerberos implementation)
241 +
242 +        OpenSSL 1.0.1o
243 +
244 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
245 +
246 +        TCP Resassemly resource exhaustion bug:
247 +        There is a mistake with the introduction of VNET, which converted the
248 +        global limit on the number of segments that could belong to reassembly
249 +        queues into a per-VNET limit.  Because mbufs are allocated from a
250 +        global pool, in the presence of a sufficient number of VNETs, the
251 +        total number of mbufs attached to reassembly queues can grow to the
252 +        total number of mbufs in the system, at which point all network
253 +        traffic would cease.
254 +        Obtained from: FreeBSD 8
255 +
256 +        OpenSSH
257 +
258 +        Fix two security vulnerabilities:
259 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
260 +        offers a certificate. [CVE-2014-2653]
261 +
262 +        OpenSSH servers which are configured to allow password authentication
263 +        using PAM (default) would allow many password attempts. A bug allows
264 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
265 +
266 +
267 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
268 +
269 + 20150726:
270 +        BSD Sort updated
271 +
272 +        sqlite 3.8.10.2
273 +
274 + 20150725:
275 +        Import reallocarray from OpenBSD's libc.  
276 +
277 +        The reallocarray() function is similar to realloc() except it operates on
278 +        nmemb members of size size and checks for integer overflow in the
279 +        calculation nmemb * size.
280 +
281 + 20150722:
282 +        Fix a bug where TCP connections transitioning to LAST_ACK
283 +        state can get stuck. This can result in a denial of service.
284 +
285 + 20150715:
286 +        libmport now supports @shell and @sample in plists. This means that
287 +        a shell port can automatically add an entry to /etc/shells and remove
288 +        it upon uninstallation. For sample files, a copy is made without the
289 +        .sample extension if one does not exist and it is removed automatically
290 +        only if the md5 hash of the two files is the same.
291 +
292 + 20150709:
293 +        flex 2.5.39
294 +
295 + 20150702:
296 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
297 +        with zfs set compression=lz4 pool/path.
298 +
299 +        Verify it's working with
300 +        zfs get compressratio pool/path
301 +        du -h -s *
302 +
303 +        Note you must write new data when turning on compression to see
304 +        changes. Existing files are not compressed.
305 +
306 +        Note: While we used the same basic implementation of lz4 that
307 +        FreeBSD and OpenZFS uses, we did not yet implement features support
308 +        and the zfs version still reports 28. This may come in a future update
309 +        to ZFS.
310 +
311 + 20150621:
312 +        libmport now automatically stops services when deleting packages.
313 +
314 +        The package must have installed an rc.d script in /usr/local/etc
315 +        for this to work. This is equivalent to running service <name> onestop
316 +
317 + 20150618:
318 +        Sendmail
319 +
320 +        With the recent changes to OpenSSL to block 512 bit certificates,
321 +        sendmail can't connect with TLS to some servers.
322 +
323 +        Increase the default size to 1024 bit for client connections to
324 +        match the server configuration.
325 +
326 +        ZFS
327 +
328 +        Added ZFS TRIM support which is enabled by default. To disable
329 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
330 +
331 +        Creating new ZFS pools and adding new devices to existing pools
332 +        first performs a full device level TRIM which can take a significant
333 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
334 +        to disable this behaviour.
335 +
336 +        ZFS TRIM requires the underlying device support BIO_DELETE which
337 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
338 +        via CAM, which are typically supported by SSD's.
339 +
340 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
341 +        under kstat.zfs.misc.zio_trim.
342 +
343 +        rc.d
344 +
345 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
346 +        implies everything is mounted and ready to go.
347 +
348 +        Changed how ip6addressctl maps IPv6 on startup.
349 +
350 + 20150613:
351 +        tzdata 2015d
352 +
353 + 20150612:
354 +        OpenSSL 0.9.8zg
355 +
356 + 20150419:
357 +        MidnightBSD 0.6 stable branch created. Continue 0.7
358 +        development.
359 +
360 + 20150418:
361 +        sqlite 3.8.9
362 +
363 + 20150407:
364 +        Fix two security vulnerabilities:
365 +
366 +        The previous fix for IGMP had an overflow issue. This has been corrected.
367 +
368 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
369 +        suggested Current Hop Limit value of a link, which will replace
370 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
371 +        system.
372 +
373 + 20150319:
374 +        OpenSSL 0.9.8.zf
375 +
376 +        mksh R50e
377 +
378 +        Apple mDNSResponder 561.1.1
379 +
380 + 20150306:
381 +        Upgrade OpenSSL to 0.9.8ze
382 +
383 + 20150225:
384 +        Fix two security vulnerabilities.
385 +
386 +        1. BIND servers which are configured to perform DNSSEC validation and which
387 +        are using managed keys (which occurs implicitly when using
388 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
389 +        unpredictable behavior due to the use of an improperly initialized
390 +        variable.
391 +
392 +        CVE-2015-1349
393 +
394 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
395 +        in a buffer which is too small for the requested operation.
396 +
397 +        This can result in a DOS attack.
398 +
399 + 20141211:
400 +        Fix a security issue with file and libmagic that can allow
401 +        an attacker to create a denial of service attack on any
402 +        program that uses libmagic.
403 +
404 + 20141109:
405 +        Fix building perl during buildworld when the GDBM port is installed.
406 +
407 + 20141106:
408 +        tzdata 2014i
409 +
410 + 20141102:
411 +        serf 1.3.8
412 +
413 + 20141031:
414 +        tnftp 20141031 fixes a security vulnerability with tnftp,
415 +        CVE-2014-8517.
416 +
417 + 20141028:
418 +        OpenSSL 0.9.8zc
419 +
420 + 20141021:
421 +        Fix several security vulnerabilities in routed, rtsold,
422 +        and namei with respect to Capsicum sandboxes looking up
423 +        nonexistent path names and leaking memory.
424 +
425 +        The input path in routed(8) will accept queries from any source and
426 +        attempt to answer them.  However, the output path assumes that the
427 +        destination address for the response is on a directly connected
428 +        network.
429 +
430 +        Due to a missing length check in the code that handles DNS parameters,
431 +        a malformed router advertisement message can result in a stack buffer
432 +        overflow in rtsold(8).
433 +
434 + 20141011:
435 +        mksh R50d - fix field splitting regression and null
436 +        pointer dereference
437 +
438 +        xz 5.0.7
439 +
440 +        OpenSSH 6.6p1
441 +
442 + 20141004:
443 +        mksh R50c - security update for environment var bug with
444 +        foo vs foo+    
445 +
446 + 20141002:
447 +        sqlite 3.8.6
448 +
449 +        sudo 1.7.8 - some issues with the current version, but we're slowly
450 +        getting up to date.
451 +
452 + 20141001:
453 +        mksh R50b
454 +
455 +        libmport now supports plist commands @dir, @owner, @group, @mode.
456 +
457 +        sudo 1.7.6p2
458 +
459 + 20140916:
460 +        Fix a security issue with TCP SYN.
461 +
462 +        When a segment with the SYN flag for an already existing connection arrives,
463 +        the TCP stack tears down the connection, bypassing a check that the
464 +        sequence number in the segment is in the expected window.
465 +
466 + 20140909:
467 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
468 +        with some programs including Dovecot.
469 +
470 +        OpenSSL security patch:
471 +
472 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
473 +        to consume large amounts of memory. [CVE-2014-3506]
474 +
475 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
476 +        memory. [CVE-2014-3507]
477 +
478 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
479 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
480 +        the stack. [CVE-2014-3508]
481 +
482 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
483 +        a denial of service attack. [CVE-2014-3510]
484 +
485 + 20140902:
486 +        We're now 0.6-CURRENT
487 +
488 +        Update USB quirks to support K70 Corsair keyboard, and several
489 +        other devices.
490 +
491 + 20140827:
492 +        Perl 5.18.2
493 +
494 + 20140728:
495 +        Jails now run shutdown scripts.
496 +
497 + 20140710:
498 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
499 +        before sharing with userland.
500 +
501 + 20140701:
502 +        MKSH R50
503 +
504 + 20140630:
505 +        File 5.19
506 +
507 + 20140605:
508 +        Fix four security issues with OpenSSL
509 +
510 + 20140604:
511 +        Sendmail failed to properly set close-on-exec for open file descriptors.
512 +
513 +        ktrace page fault kernel trace entries were set to an incorrect size which resulted
514 +        in a leak of information.
515 +
516 + 20140430:
517 +        Fix a TCP reassembly bug that could result in a DOS attack
518 +        of the system. It may be possible to obtain portions
519 +        of kernel memory as well.
520 +
521 + 20140411:
522 +        Update zlib to 1.2.7
523 +
524 + 20140122:
525 +        Support for username with length 32. Previous limit was 16
526 +
527 + 20140114:
528 +        Fix two security vulnerabilities.
529 +
530 +        bsnmpd contains a stack overflow when sent certain queries.
531 +
532 +        bind 9.8 when using NSEC3-signed zones zones, will crash with special
533 +        crafted packets.
534 +
535 + 20131228:
536 +        Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
537 +
538 +        Updated em(4), igb(4) and ixgbe(4)
539 +
540 +        MidnightBSD now works with Z87 Intel chipsets.
541 +
542 + 20131207:
543 +        Remove sparc64 architecture. It hasn't been working for awhile
544 +        and it's not useful for desktops anymore.
545 +
546 + 20131205:
547 +        OpenSSH 6.4p1
548 +
549 + 20131203:
550 +        Perl 5.18.1 imported.
551 +
552 +        Update less to v458
553 +
554 + 20131130:
555 +        Remove named from base. We still include the client utilities for
556 +        now until replacements can be found.
557 +
558 + 20131004:
559 +        rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
560 +
561 + 20130917:
562 +        Support for 65,536 routing tables was added.  A new fib specific
563 +        field has been added to mbuf.  This is an increase from 16.
564 +
565 + 20130910:
566 +        Security updates: (kern.osreldate 5001)
567 +
568 +        nullfs(5)
569 +
570 +        The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
571 +        check whether the source and target of the link are both in the same
572 +        nullfs instance.  It is therefore possible to create a hardlink from a
573 +        location in one nullfs instance to a file in another, as long as the
574 +        underlying (source) filesystem is the same.
575 +
576 +        ifioctl
577 +
578 +        As is commonly the case, the IPv6 and ATM network layer ioctl request
579 +        handlers are written in such a way that an unrecognized request is
580 +        passed on unmodified to the link layer, which will either handle it or
581 +        return an error code.
582 +
583 +        Network interface drivers, however, assume that the SIOCSIFADDR,
584 +        SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
585 +        handled at the network layer, and therefore do not perform input
586 +        validation or verify the caller's credentials.  Typical link-layer
587 +        actions for these requests may include marking the interface as "up"
588 +        and resetting the underlying hardware.
589 +
590 + 20130824:
591 +        Fix a bug in sendmail 8.14.7 that interferes with how it
592 +        handles AAAA records interoperating with Microsoft DNS servers.
593 +        FreeBSD has already reported this to Sendmail and a fix
594 +        will be included in the next release.
595 +
596 +        Subversion 1.8.1 is now in the base system as a static
597 +        binary.  It has limited functionality, but can be used to
598 +        checkout/commit code.  It is named svnlite.
599 +
600 + 20130822:
601 +        Fix two security vulnerabilities.
602 +
603 +        Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
604 +        This could be exploited to read memory by a user process.
605 +
606 +        When initializing the SCTP state cookie being sent in INIT-ACK chunks,
607 +        a buffer allocated from the kernel stack is not completely initialized.
608 +
609 +        Import xz 5.0.4
610 +
611 +        Import sqlite 3.7.17
612 +
613 +        Import BIND 9.8.5-P2
614 +
615 + 20130814:
616 +        mksh R48 imported.
617 +
618 +        Sendmail 8.14.7 imported.
619 +
620 + 20130717:
621 +        libmport bug was fixed causing hash verification to fail.
622 +
623 +        virtio(4) imported from FreeBSD 9-stable. SCSI support not
624 +        included.
625 +
626 + 20130612:
627 +        RELENG_0_4 created for 0.4. Development continues on 0.5.
628 +
629 + 20130402:
630 +        Update BIND and OpenSSL to resolve security advisories.
631 +
632 + 20130305:
633 +        MKSH R44 imported.
634 +
635 + 20130213:
636 +        MKSH R42b imported
637 +
638 + 20130211:
639 +        MKSH R42 imported
640 +
641 + 20130125:
642 +        MKSH R41 imported
643 +
644 + 20130122:
645 +        OpenSSH 5.8p2 imported
646 +
647 +        SQLite 3.7.15.2 imported
648 +
649 +        Fixed a longstanding bug in libmport extrating new index files.
650 +
651 + 20120710:
652 +        BSD licensed sort imported from FreeBSD-CURRENT
653 +
654 +        For now, GNU sort is installed as gnusort, but it will
655 +        go away in time.
656 +
657 + 20120708:
658 +        tcsh 6.18.01 imported.
659 +
660 +        NetBSD's iconv imported.
661 +
662 +        libc gains strnlen(3), memrchr(3), stpncpy(3).
663 +
664 + 20120612:
665 +        BIND security update related to CVE-2012-1667.
666 +
667 +        Zero length resource records can cause BIND to crash resulting
668 +        in a DOS attack or information disclosure.
669 +
670 + 20120407:
671 +        mksh R40f (fixes regression)
672 +
673 + 20120328:
674 +        mksh R40e
675 +
676 +        Perl 5.14.2
677 +
678 + 20120229:
679 +        cpucontrol(8) and cpuctl(4) added from FreeBSD 7-stable.
680 +
681 + 20120209:
682 +        mDNSResponder 333.10 imported
683 +
684   20111227:
685          import raid5 module for GEOM, graid5(8)
686  
# Line 1183 | Line 1864 | Contact Warner Losh if you have any questions about yo
1864   this document.
1865  
1866   $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
1867 < $MidnightBSD: src/UPDATING,v 1.154 2011/12/24 03:30:18 laffer1 Exp $
1867 > $MidnightBSD$

Comparing trunk/UPDATING (property cvs2svn:cvs-rev):
Revision 4476 by laffer1, Wed Dec 28 00:46:31 2011 UTC vs.
Revision 7741 by laffer1, Mon Aug 15 02:47:04 2016 UTC

# Line 1 | Line 0
1 1.155

Comparing trunk/UPDATING (property svn:keywords):
Revision 4476 by laffer1, Wed Dec 28 00:46:31 2011 UTC vs.
Revision 7741 by laffer1, Mon Aug 15 02:47:04 2016 UTC

# Line 0 | Line 1
1 + MidnightBSD=%H

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines