ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 5706 by laffer1, Wed Jan 23 02:35:12 2013 UTC vs.
Revision 7210 by laffer1, Thu Aug 6 00:10:00 2015 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20160805:
4 +        routed - fix a potential security issue where traffic from outside
5 +        the network can disrupt routing.
6 +
7 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
8 +        to run.
9 +
10 + 20160802:
11 +        jansson 2.7 library added. (libjansson is a JSON library in C)
12 +
13 + 20160728:
14 +        Heimdal 1.5.2 (kerberos implementation)
15 +
16 +        OpenSSL 1.0.1o
17 +
18 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
19 +
20 +        TCP Resassemly resource exhaustion bug:
21 +        There is a mistake with the introduction of VNET, which converted the
22 +        global limit on the number of segments that could belong to reassembly
23 +        queues into a per-VNET limit.  Because mbufs are allocated from a
24 +        global pool, in the presence of a sufficient number of VNETs, the
25 +        total number of mbufs attached to reassembly queues can grow to the
26 +        total number of mbufs in the system, at which point all network
27 +        traffic would cease.
28 +        Obtained from: FreeBSD 8
29 +
30 +        OpenSSH
31 +
32 +        Fix two security vulnerabilities:
33 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
34 +        offers a certificate. [CVE-2014-2653]
35 +
36 +        OpenSSH servers which are configured to allow password authentication
37 +        using PAM (default) would allow many password attempts. A bug allows
38 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
39 +
40 +
41 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
42 +
43 + 20160726:
44 +        BSD Sort updated
45 +
46 +        sqlite 3.8.10.2
47 +
48 + 20160725:
49 +        Import reallocarray from OpenBSD's libc.  
50 +
51 +        The reallocarray() function is similar to realloc() except it operates on
52 +        nmemb members of size size and checks for integer overflow in the
53 +        calculation nmemb * size.
54 +
55 + 20150722:
56 +        Fix a bug where TCP connections transitioning to LAST_ACK
57 +        state can get stuck. This can result in a denial of service.
58 +
59 + 20150715:
60 +        libmport now supports @shell and @sample in plists. This means that
61 +        a shell port can automatically add an entry to /etc/shells and remove
62 +        it upon uninstallation. For sample files, a copy is made without the
63 +        .sample extension if one does not exist and it is removed automatically
64 +        only if the md5 hash of the two files is the same.
65 +
66 + 20150709:
67 +        flex 2.5.39
68 +
69 + 20150702:
70 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
71 +        with zfs set compression=lz4 pool/path.
72 +
73 +        Verify it's working with
74 +        zfs get compressratio pool/path
75 +        du -h -s *
76 +
77 +        Note you must write new data when turning on compression to see
78 +        changes. Existing files are not compressed.
79 +
80 +        Note: While we used the same basic implementation of lz4 that
81 +        FreeBSD and OpenZFS uses, we did not yet implement features support
82 +        and the zfs version still reports 28. This may come in a future update
83 +        to ZFS.
84 +
85 + 20150621:
86 +        libmport now automatically stops services when deleting packages.
87 +
88 +        The package must have installed an rc.d script in /usr/local/etc
89 +        for this to work. This is equivalent to running service <name> onestop
90 +
91 + 20150618:
92 +        Sendmail
93 +
94 +        With the recent changes to OpenSSL to block 512 bit certificates,
95 +        sendmail can't connect with TLS to some servers.
96 +
97 +        Increase the default size to 1024 bit for client connections to
98 +        match the server configuration.
99 +
100 +        ZFS
101 +
102 +        Added ZFS TRIM support which is enabled by default. To disable
103 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
104 +
105 +        Creating new ZFS pools and adding new devices to existing pools
106 +        first performs a full device level TRIM which can take a significant
107 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
108 +        to disable this behaviour.
109 +
110 +        ZFS TRIM requires the underlying device support BIO_DELETE which
111 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
112 +        via CAM, which are typically supported by SSD's.
113 +
114 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
115 +        under kstat.zfs.misc.zio_trim.
116 +
117 +        rc.d
118 +
119 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
120 +        implies everything is mounted and ready to go.
121 +
122 +        Changed how ip6addressctl maps IPv6 on startup.
123 +
124 + 20150613:
125 +        tzdata 2015d
126 +
127 + 20150612:
128 +        OpenSSL 0.9.8zg
129 +
130 + 20150419:
131 +        MidnightBSD 0.6 stable branch created. Continue 0.7
132 +        development.
133 +
134 + 20150418:
135 +        sqlite 3.8.9
136 +
137 + 20150407:
138 +        Fix two security vulnerabilities:
139 +
140 +        The previous fix for IGMP had an overflow issue. This has been corrected.
141 +
142 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
143 +        suggested Current Hop Limit value of a link, which will replace
144 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
145 +        system.
146 +
147 + 20150319:
148 +        OpenSSL 0.9.8.zf
149 +
150 +        mksh R50e
151 +
152 +        Apple mDNSResponder 561.1.1
153 +
154 + 20150306:
155 +        Upgrade OpenSSL to 0.9.8ze
156 +
157 + 20150225:
158 +        Fix two security vulnerabilities.
159 +
160 +        1. BIND servers which are configured to perform DNSSEC validation and which
161 +        are using managed keys (which occurs implicitly when using
162 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
163 +        unpredictable behavior due to the use of an improperly initialized
164 +        variable.
165 +
166 +        CVE-2015-1349
167 +
168 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
169 +        in a buffer which is too small for the requested operation.
170 +
171 +        This can result in a DOS attack.
172 +
173 + 20141211:
174 +        Fix a security issue with file and libmagic that can allow
175 +        an attacker to create a denial of service attack on any
176 +        program that uses libmagic.
177 +
178 + 20141109:
179 +        Fix building perl during buildworld when the GDBM port is installed.
180 +
181 + 20141106:
182 +        tzdata 2014i
183 +
184 + 20141102:
185 +        serf 1.3.8
186 +
187 + 20141031:
188 +        tnftp 20141031 fixes a security vulnerability with tnftp,
189 +        CVE-2014-8517.
190 +
191 + 20141028:
192 +        OpenSSL 0.9.8zc
193 +
194 + 20141021:
195 +        Fix several security vulnerabilities in routed, rtsold,
196 +        and namei with respect to Capsicum sandboxes looking up
197 +        nonexistent path names and leaking memory.
198 +
199 +        The input path in routed(8) will accept queries from any source and
200 +        attempt to answer them.  However, the output path assumes that the
201 +        destination address for the response is on a directly connected
202 +        network.
203 +
204 +        Due to a missing length check in the code that handles DNS parameters,
205 +        a malformed router advertisement message can result in a stack buffer
206 +        overflow in rtsold(8).
207 +
208 + 20141011:
209 +        mksh R50d - fix field splitting regression and null
210 +        pointer dereference
211 +
212 +        xz 5.0.7
213 +
214 +        OpenSSH 6.6p1
215 +
216 + 20141004:
217 +        mksh R50c - security update for environment var bug with
218 +        foo vs foo+    
219 +
220 + 20141002:
221 +        sqlite 3.8.6
222 +
223 +        sudo 1.7.8 - some issues with the current version, but we're slowly
224 +        getting up to date.
225 +
226 + 20141001:
227 +        mksh R50b
228 +
229 +        libmport now supports plist commands @dir, @owner, @group, @mode.
230 +
231 +        sudo 1.7.6p2
232 +
233 + 20140916:
234 +        Fix a security issue with TCP SYN.
235 +
236 +        When a segment with the SYN flag for an already existing connection arrives,
237 +        the TCP stack tears down the connection, bypassing a check that the
238 +        sequence number in the segment is in the expected window.
239 +
240 + 20140909:
241 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
242 +        with some programs including Dovecot.
243 +
244 +        OpenSSL security patch:
245 +
246 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
247 +        to consume large amounts of memory. [CVE-2014-3506]
248 +
249 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
250 +        memory. [CVE-2014-3507]
251 +
252 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
253 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
254 +        the stack. [CVE-2014-3508]
255 +
256 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
257 +        a denial of service attack. [CVE-2014-3510]
258 +
259 + 20140902:
260 +        We're now 0.6-CURRENT
261 +
262 +        Update USB quirks to support K70 Corsair keyboard, and several
263 +        other devices.
264 +
265 + 20140827:
266 +        Perl 5.18.2
267 +
268 + 20140728:
269 +        Jails now run shutdown scripts.
270 +
271 + 20140710:
272 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
273 +        before sharing with userland.
274 +
275 + 20140701:
276 +        MKSH R50
277 +
278 + 20140630:
279 +        File 5.19
280 +
281 + 20140605:
282 +        Fix four security issues with OpenSSL
283 +
284 + 20140604:
285 +        Sendmail failed to properly set close-on-exec for open file descriptors.
286 +
287 +        ktrace page fault kernel trace entries were set to an incorrect size which resulted
288 +        in a leak of information.
289 +
290 + 20140430:
291 +        Fix a TCP reassembly bug that could result in a DOS attack
292 +        of the system. It may be possible to obtain portions
293 +        of kernel memory as well.
294 +
295 + 20140411:
296 +        Update zlib to 1.2.7
297 +
298 + 20140122:
299 +        Support for username with length 32. Previous limit was 16
300 +
301 + 20140114:
302 +        Fix two security vulnerabilities.
303 +
304 +        bsnmpd contains a stack overflow when sent certain queries.
305 +
306 +        bind 9.8 when using NSEC3-signed zones zones, will crash with special
307 +        crafted packets.
308 +
309 + 20131228:
310 +        Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
311 +
312 +        Updated em(4), igb(4) and ixgbe(4)
313 +
314 +        MidnightBSD now works with Z87 Intel chipsets.
315 +
316 + 20131207:
317 +        Remove sparc64 architecture. It hasn't been working for awhile
318 +        and it's not useful for desktops anymore.
319 +
320 + 20131205:
321 +        OpenSSH 6.4p1
322 +
323 + 20131203:
324 +        Perl 5.18.1 imported.
325 +
326 +        Update less to v458
327 +
328 + 20131130:
329 +        Remove named from base. We still include the client utilities for
330 +        now until replacements can be found.
331 +
332 + 20131004:
333 +        rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
334 +
335 + 20130917:
336 +        Support for 65,536 routing tables was added.  A new fib specific
337 +        field has been added to mbuf.  This is an increase from 16.
338 +
339 + 20130910:
340 +        Security updates: (kern.osreldate 5001)
341 +
342 +        nullfs(5)
343 +
344 +        The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
345 +        check whether the source and target of the link are both in the same
346 +        nullfs instance.  It is therefore possible to create a hardlink from a
347 +        location in one nullfs instance to a file in another, as long as the
348 +        underlying (source) filesystem is the same.
349 +
350 +        ifioctl
351 +
352 +        As is commonly the case, the IPv6 and ATM network layer ioctl request
353 +        handlers are written in such a way that an unrecognized request is
354 +        passed on unmodified to the link layer, which will either handle it or
355 +        return an error code.
356 +
357 +        Network interface drivers, however, assume that the SIOCSIFADDR,
358 +        SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
359 +        handled at the network layer, and therefore do not perform input
360 +        validation or verify the caller's credentials.  Typical link-layer
361 +        actions for these requests may include marking the interface as "up"
362 +        and resetting the underlying hardware.
363 +
364 + 20130824:
365 +        Fix a bug in sendmail 8.14.7 that interferes with how it
366 +        handles AAAA records interoperating with Microsoft DNS servers.
367 +        FreeBSD has already reported this to Sendmail and a fix
368 +        will be included in the next release.
369 +
370 +        Subversion 1.8.1 is now in the base system as a static
371 +        binary.  It has limited functionality, but can be used to
372 +        checkout/commit code.  It is named svnlite.
373 +
374 + 20130822:
375 +        Fix two security vulnerabilities.
376 +
377 +        Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
378 +        This could be exploited to read memory by a user process.
379 +
380 +        When initializing the SCTP state cookie being sent in INIT-ACK chunks,
381 +        a buffer allocated from the kernel stack is not completely initialized.
382 +
383 +        Import xz 5.0.4
384 +
385 +        Import sqlite 3.7.17
386 +
387 +        Import BIND 9.8.5-P2
388 +
389 + 20130814:
390 +        mksh R48 imported.
391 +
392 +        Sendmail 8.14.7 imported.
393 +
394 + 20130717:
395 +        libmport bug was fixed causing hash verification to fail.
396 +
397 +        virtio(4) imported from FreeBSD 9-stable. SCSI support not
398 +        included.
399 +
400 + 20130612:
401 +        RELENG_0_4 created for 0.4. Development continues on 0.5.
402 +
403 + 20130402:
404 +        Update BIND and OpenSSL to resolve security advisories.
405 +
406 + 20130305:
407 +        MKSH R44 imported.
408 +
409 + 20130213:
410 +        MKSH R42b imported
411 +
412 + 20130211:
413 +        MKSH R42 imported
414 +
415 + 20130125:
416 +        MKSH R41 imported
417 +
418   20130122:
419          OpenSSH 5.8p2 imported
420  
# Line 1223 | Line 1638 | Contact Warner Losh if you have any questions about yo
1638   this document.
1639  
1640   $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
1641 < $MidnightBSD: src/UPDATING,v 1.164 2013/01/22 12:59:03 laffer1 Exp $
1641 > $MidnightBSD$

Comparing trunk/UPDATING (property cvs2svn:cvs-rev):
Revision 5706 by laffer1, Wed Jan 23 02:35:12 2013 UTC vs.
Revision 7210 by laffer1, Thu Aug 6 00:10:00 2015 UTC

# Line 1 | Line 0
1 1.165

Comparing trunk/UPDATING (property svn:keywords):
Revision 5706 by laffer1, Wed Jan 23 02:35:12 2013 UTC vs.
Revision 7210 by laffer1, Thu Aug 6 00:10:00 2015 UTC

# Line 0 | Line 1
1 + MidnightBSD=%H

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines