ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 6841 by laffer1, Sat Oct 4 14:23:36 2014 UTC vs.
Revision 8465 by laffer1, Sun Sep 18 22:20:09 2016 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20160916:
4 +        The random(4) support for the VIA hardware random number
5 +        generator (`PADLOCK') is no longer enabled unconditionally.
6 +        Add the PADLOCK_RNG option in the custom kernel config if
7 +        needed.  The GENERIC kernels on i386 and amd64 do include the
8 +        option, so the change only affects the custom kernel
9 +        configurations.
10 +
11 +        A new version of ZFS (pool version 5000) has been merged.
12 +        Starting with this version the old system of ZFS pool versioning
13 +        is superseded by "feature flags". This concept enables forward
14 +        compatibility against certain future changes in functionality of ZFS
15 +        pools. The first two read-only compatible "feature flags" for ZFS
16 +        pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
17 +        For more information read the new zpool-features(7) manual page.
18 +        Please refer to the "ZFS notes" section of this file for information
19 +        on upgrading boot ZFS pools.
20 +
21 + 20160906:
22 +        Add support for the MosChip MCS9904 four serial ports
23 +        controller.
24 +
25 +        Add support for walltimestamp in DTrace.
26 +
27 +        Various gdb improvments.
28 +
29 +        ZFS
30 +        Import the zio nop-write improvement from Illumos. To reduce I/O,
31 +        nop-write omits overwriting data if the checksum (cryptographically
32 +        secure) of new data matches the checksum of existing data.
33 +        It also saves space if snapshots are in use.
34 +
35 +        It currently works only on datasets with enabled compression, disabled
36 +        deduplication and sha256 checksums.
37 +
38 +        Add loader(8) tunable to enable/disable nopwrite functionality:
39 +        vfs.zfs.nopwrite_enabled
40 +
41 +        Introduce a new dataset aclmode setting "restricted" to protect ACL's
42 +        being destroyed or corrupted by a drive-by chmod.
43 +
44 +        New loader-only tunables:
45 +        vfs.zfs.sync_pass_deferred_free
46 +        vfs.zfs.sync_pass_dont_compress
47 +        vfs.zfs.sync_pass_rewrite
48 +
49 +        chkgrp(8) add support for q flag
50 +
51 +        Fix problem with the Samsung 840 PRO series SSD detection.
52 +        The device reports support for SATA Asynchronous Notification in its
53 +        IDENTIFY data, but returns error on attempt to enable that feature.
54 +        Make SATA XPT of CAM only report these errors, but not fail the device.
55 +
56 + 20160905:
57 +        Add a resource limit for the total number of kqueues
58 +        available to the user. Kqueue now saves the ucred of the
59 +        allocating thread, to correctly decrement the counter on close.
60 +        Based on FreeBSD SVN 256849
61 +
62 +        Import netcat from OpenBSD 5.2
63 +
64 + 20160904:
65 +        Introduced experimental TCP sysctls starting with
66 +        net.inet.tcp.experimental.initcwnd10
67 +
68 + 20160814:
69 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
70 +        in the release after the fact.
71 +
72 +        tzdata 2016a
73 +
74 + 20160811:
75 +        libdispatch 210
76 +
77 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
78 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
79 +        added WD Red drives.
80 +
81 +        Updated list of pci device vendors.
82 +
83 +        Updated list of usb devices.
84 +
85 + 20160807:
86 +        Implement several changes to libmport to fix some memory corruption issues.
87 +
88 + 20160806:
89 +        sqlite3 3.13.0
90 +
91 + 20160805:
92 +        Merged fixes for libmport that improve error handling when installing packages. Also
93 +        support mkdir -p like behavior for plist entries.
94 +
95 + 20160531:
96 +        Fix four security issues with MidnightBSD.
97 +
98 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
99 +        struct before sending to userland in the linux emulation layer.
100 +
101 +        The compat 43 stat(2) system call exposes kernel stack to userland.
102 +
103 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
104 +        cpio directory traversal and an integer signedness error in the archive
105 +        write zip data routine.
106 +
107 +
108 + 20160528:
109 +        Fixed minor issues with mined(1) and msearch(1).
110 +
111 + 20160526:
112 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
113 +
114 +        Fix libpmc(3) build with clang compiler.
115 +
116 + 20160519:
117 +        Kernel Security updates
118 +
119 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
120 +        local user to overwrite a portion of the kernel memory.
121 +
122 +        Incorrect argument handling in sendmsg(2)
123 +
124 +        Incorrect argument handling in the socket code allows malicious local
125 +        user to overwrite large portion of the kernel memory.
126 +
127 + 20160505:
128 +        OpenSSL security patch
129 +
130 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
131 +        by making sure that always the same bytes are read and compared against
132 +        either the MAC or padding bytes. But it no longer checked that there was
133 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
134 +
135 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
136 +        Base64 encoding of binary data. [CVE-2016-2105]
137 +
138 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
139 +        believed that there can be no overflows in internal code due to this problem.
140 +        [CVE-2016-2106]
141 +
142 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
143 +        a short invalid encoding can casuse allocation of large amounts of memory
144 +        potentially consuming excessive resources or exhausting memory.
145 +        [CVE-2016-2109]
146 +
147 + 20160412:
148 +        0.8 stable branch created. Continue development as 0.9.
149 +
150 +        Fix several issues with wait6 system call addition.
151 +
152 + 20160409:
153 +        libmport now supports two new plist formats:
154 +        @(root,wheel,4775) myfile
155 +        @dir(root,wheel,775) mydir
156 +
157 +        On delete, absoluate paths are now handled properly.
158 +
159 + 20160317:
160 +        OpenSSH doesn't have the luck of the Irish.
161 +
162 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
163 +        run shell commands on the call to xauth.
164 +
165 +        Incorrect argument validation in sysarch(2)
166 +
167 +        A special combination of sysarch(2) arguments, specify a request to
168 +        uninstall a set of descriptors from the LDT.  The start descriptor
169 +        is cleared and the number of descriptors are provided.  Due to invalid
170 +        use of a signed intermediate value in the bounds checking during argument
171 +        validity verification, unbound zero'ing of the process LDT and adjacent
172 +        memory can be initiated from usermode.
173 +
174 +        Patch obtained from FreeBSD.
175 +
176 + 20160229:
177 +        top now displays information on ZFS arc cache.
178 +
179 + 20160228:
180 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
181 +
182 + 20160222:
183 +        Introduce pipe2 to linux emulation layer.
184 +
185 + 20160114:
186 +        OpenSSL
187 +
188 +        The signature verification routines will crash with a NULL pointer dereference
189 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
190 +        mask generation function parameter. [CVE-2015-3194]
191 +
192 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
193 +        memory. [CVE-2015-3195]
194 +
195 +        If PSK identity hints are received by a multi-threaded client then the values
196 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
197 +
198 +        Fix security on bsnmpd configuration file during installation.
199 +
200 +        TCP MD5 signature denial of service
201 +
202 +        A programming error in processing a TCP connection with both TCP_MD5SIG
203 +        and TCP_NOOPT socket options may lead to kernel crash.
204 +
205 +        SCTP
206 +
207 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
208 +        can lead to either a failed kernel assertion or to a NULL pointer
209 +        dereference.  In either case, a kernel panic will follow.
210 +
211 + 20160102:
212 +        Happy New Year
213 +
214 + 20151101:
215 +        Increase kern.ipc.somaxconn default to 256.
216 +
217 + 20151017:
218 +        Add initial statistics api to libmport and a driver to print
219 +        it in mport(1).
220 +
221 + 20151002:
222 +        Revised rpcbind(8) patch to fix issues with NIS
223 +
224 + 20150930:
225 +        In rpcbind(8), netbuf structures are copied directly, which would result in
226 +        two netbuf structures that reference to one shared address buffer.  When one
227 +        of the two netbuf structures is freed, access to the other netbuf structure
228 +        would result in an undefined result that may crash the rpcbind(8) daemon.
229 +
230 + 20150926:
231 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
232 +        to replace @exec and @unexec.  
233 +
234 +        pre exec runs afer pre-install scripts but before actual installation
235 +
236 +        post exec runs after install but before post install scripts and
237 +        pkg message.
238 +
239 +        pre unexec runs before pre uninstall scripts
240 +
241 +        post unexec runs before de-install scripts and after file removal.
242 +
243 + 20150917:
244 +        Fix kqueue write events for files > 2GB
245 +
246 + 20150825:
247 +        kernel:
248 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
249 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
250 +
251 +        openssh:
252 +        A programming error in the privileged monitor process of the sshd(8)
253 +        service may allow the username of an already-authenticated user to be
254 +        overwritten by the unprivileged child process.
255 +
256 +        A use-after-free error in the privileged monitor process of he sshd(8)
257 +        service may be deterministically triggered by the actions of a
258 +        compromised unprivileged child process.
259 +
260 +        A use-after-free error in the session multiplexing code in the sshd(8)
261 +        service may result in unintended termination of the connection.
262 +
263 + 20150818:
264 +        expat security fix
265 +
266 + 20150815:
267 +        libc changes:
268 +        setmode(3) now returns errno consistently on error.
269 +        libc will compile without error using clang
270 +
271 + 20150814:
272 +        wait6 system call added.
273 +
274 +        date(1) now handles non numeric numbers passed to -r
275 +        like GNU coreutils for improved compatibility.
276 +
277 + 20150811:
278 +        ata(4) AMD Hudson2 SATA controller support.
279 +        Intel lynxpoint SATA.
280 +
281 +        Fix some const warnings when building several device drivers
282 +        with llvm/clang.
283 +
284 +        Sync cas(4) with FreeBSD 9-stable.
285 +
286 +        Fix some minor issues with ath(4).
287 +
288 + 20150809:
289 +        xz 5.0.8
290 +
291 + 20150808:
292 +        libmport now logs installation and removal of packages to syslog.
293 +
294 + 20150805:
295 +        routed - fix a potential security issue where traffic from outside
296 +        the network can disrupt routing.
297 +
298 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
299 +        to run.
300 +
301 + 20150802:
302 +        jansson 2.7 library added. (libjansson is a JSON library in C)
303 +
304 + 20150728:
305 +        Heimdal 1.5.2 (kerberos implementation)
306 +
307 +        OpenSSL 1.0.1o
308 +
309 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
310 +
311 +        TCP Resassemly resource exhaustion bug:
312 +        There is a mistake with the introduction of VNET, which converted the
313 +        global limit on the number of segments that could belong to reassembly
314 +        queues into a per-VNET limit.  Because mbufs are allocated from a
315 +        global pool, in the presence of a sufficient number of VNETs, the
316 +        total number of mbufs attached to reassembly queues can grow to the
317 +        total number of mbufs in the system, at which point all network
318 +        traffic would cease.
319 +        Obtained from: FreeBSD 8
320 +
321 +        OpenSSH
322 +
323 +        Fix two security vulnerabilities:
324 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
325 +        offers a certificate. [CVE-2014-2653]
326 +
327 +        OpenSSH servers which are configured to allow password authentication
328 +        using PAM (default) would allow many password attempts. A bug allows
329 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
330 +
331 +
332 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
333 +
334 + 20150726:
335 +        BSD Sort updated
336 +
337 +        sqlite 3.8.10.2
338 +
339 + 20150725:
340 +        Import reallocarray from OpenBSD's libc.  
341 +
342 +        The reallocarray() function is similar to realloc() except it operates on
343 +        nmemb members of size size and checks for integer overflow in the
344 +        calculation nmemb * size.
345 +
346 + 20150722:
347 +        Fix a bug where TCP connections transitioning to LAST_ACK
348 +        state can get stuck. This can result in a denial of service.
349 +
350 + 20150715:
351 +        libmport now supports @shell and @sample in plists. This means that
352 +        a shell port can automatically add an entry to /etc/shells and remove
353 +        it upon uninstallation. For sample files, a copy is made without the
354 +        .sample extension if one does not exist and it is removed automatically
355 +        only if the md5 hash of the two files is the same.
356 +
357 + 20150709:
358 +        flex 2.5.39
359 +
360 + 20150702:
361 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
362 +        with zfs set compression=lz4 pool/path.
363 +
364 +        Verify it's working with
365 +        zfs get compressratio pool/path
366 +        du -h -s *
367 +
368 +        Note you must write new data when turning on compression to see
369 +        changes. Existing files are not compressed.
370 +
371 +        Note: While we used the same basic implementation of lz4 that
372 +        FreeBSD and OpenZFS uses, we did not yet implement features support
373 +        and the zfs version still reports 28. This may come in a future update
374 +        to ZFS.
375 +
376 + 20150621:
377 +        libmport now automatically stops services when deleting packages.
378 +
379 +        The package must have installed an rc.d script in /usr/local/etc
380 +        for this to work. This is equivalent to running service <name> onestop
381 +
382 + 20150618:
383 +        Sendmail
384 +
385 +        With the recent changes to OpenSSL to block 512 bit certificates,
386 +        sendmail can't connect with TLS to some servers.
387 +
388 +        Increase the default size to 1024 bit for client connections to
389 +        match the server configuration.
390 +
391 +        ZFS
392 +
393 +        Added ZFS TRIM support which is enabled by default. To disable
394 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
395 +
396 +        Creating new ZFS pools and adding new devices to existing pools
397 +        first performs a full device level TRIM which can take a significant
398 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
399 +        to disable this behaviour.
400 +
401 +        ZFS TRIM requires the underlying device support BIO_DELETE which
402 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
403 +        via CAM, which are typically supported by SSD's.
404 +
405 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
406 +        under kstat.zfs.misc.zio_trim.
407 +
408 +        rc.d
409 +
410 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
411 +        implies everything is mounted and ready to go.
412 +
413 +        Changed how ip6addressctl maps IPv6 on startup.
414 +
415 + 20150613:
416 +        tzdata 2015d
417 +
418 + 20150612:
419 +        OpenSSL 0.9.8zg
420 +
421 + 20150419:
422 +        MidnightBSD 0.6 stable branch created. Continue 0.7
423 +        development.
424 +
425 + 20150418:
426 +        sqlite 3.8.9
427 +
428 + 20150407:
429 +        Fix two security vulnerabilities:
430 +
431 +        The previous fix for IGMP had an overflow issue. This has been corrected.
432 +
433 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
434 +        suggested Current Hop Limit value of a link, which will replace
435 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
436 +        system.
437 +
438 + 20150319:
439 +        OpenSSL 0.9.8.zf
440 +
441 +        mksh R50e
442 +
443 +        Apple mDNSResponder 561.1.1
444 +
445 + 20150306:
446 +        Upgrade OpenSSL to 0.9.8ze
447 +
448 + 20150225:
449 +        Fix two security vulnerabilities.
450 +
451 +        1. BIND servers which are configured to perform DNSSEC validation and which
452 +        are using managed keys (which occurs implicitly when using
453 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
454 +        unpredictable behavior due to the use of an improperly initialized
455 +        variable.
456 +
457 +        CVE-2015-1349
458 +
459 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
460 +        in a buffer which is too small for the requested operation.
461 +
462 +        This can result in a DOS attack.
463 +
464 + 20141211:
465 +        Fix a security issue with file and libmagic that can allow
466 +        an attacker to create a denial of service attack on any
467 +        program that uses libmagic.
468 +
469 + 20141109:
470 +        Fix building perl during buildworld when the GDBM port is installed.
471 +
472 + 20141106:
473 +        tzdata 2014i
474 +
475 + 20141102:
476 +        serf 1.3.8
477 +
478 + 20141031:
479 +        tnftp 20141031 fixes a security vulnerability with tnftp,
480 +        CVE-2014-8517.
481 +
482 + 20141028:
483 +        OpenSSL 0.9.8zc
484 +
485 + 20141021:
486 +        Fix several security vulnerabilities in routed, rtsold,
487 +        and namei with respect to Capsicum sandboxes looking up
488 +        nonexistent path names and leaking memory.
489 +
490 +        The input path in routed(8) will accept queries from any source and
491 +        attempt to answer them.  However, the output path assumes that the
492 +        destination address for the response is on a directly connected
493 +        network.
494 +
495 +        Due to a missing length check in the code that handles DNS parameters,
496 +        a malformed router advertisement message can result in a stack buffer
497 +        overflow in rtsold(8).
498 +
499 + 20141011:
500 +        mksh R50d - fix field splitting regression and null
501 +        pointer dereference
502 +
503 +        xz 5.0.7
504 +
505 +        OpenSSH 6.6p1
506 +
507   20141004:
508          mksh R50c - security update for environment var bug with
509          foo vs foo+    

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines