ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 7094 by laffer1, Wed Jul 15 12:11:04 2015 UTC vs.
Revision 9196 by laffer1, Thu Nov 3 11:37:50 2016 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20161103:
4 +        OpenSSL security patch
5 +
6 +        Due to improper handling of alert packets, OpenSSL would consume an excessive
7 +        amount of CPU time processing undefined alert messages.
8 +
9 + 20161015:
10 +        libarchive 3.2.1
11 +
12 +        xz 5.2.2
13 +
14 + 20161013:
15 +        Sync ZFS code with Illuminos/FreeBSD 9.2. Added support for
16 +        feature flags, pool version 5000. This also includes some
17 +        bug fixes and performance optimizations.
18 +
19 + 20160925:
20 +        Import NetBSD vis(3) and unvis(3) as well as mtree.
21 +
22 +        one-true-awk 20121220
23 +
24 +        inetd now honors kern.ipc.somaxconn value.
25 +
26 +        netmap synced with FreeBSD 9.2
27 +
28 +        linuxolator now has dtrace probes.
29 +
30 +        bsdgrep now correctly handles -m to exclude only one file.
31 +
32 +        UFS file systems can now be resized in read-write mode due to the new
33 +        write suspension feature.
34 +
35 +        Basic support added for Intel Raid Recover Technology.
36 +
37 +        GMIRROR & GRAID3 now mark volumes clean on shutdown earlier to help with ZFS issues.
38 +
39 +        Highpoint hpt27xx now in GENERIC kernel.
40 +
41 + 20160923:
42 +        Security update for OpenSSL
43 +
44 +        A malicious client can send an excessively large OCSP Status Request extension.
45 +        If that client continually requests renegotiation, sending a large OCSP Status
46 +        Request extension each time, then there will be unbounded memory growth on the
47 +        server. [CVE-2016-6304]
48 +
49 +        An overflow can occur in MDC2_Update() either if called directly or through
50 +        the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
51 +        very large amounts of input data after a previous call to EVP_EncryptUpdate()
52 +        with a partial block then a length check can overflow resulting in a heap
53 +        corruption. [CVE-2016-6303]
54 +
55 +        If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
56 +        DoS attack where a malformed ticket will result in an OOB read which will
57 +        ultimately crash. [CVE-2016-6302]
58 +
59 +        The function BN_bn2dec() does not check the return value of BN_div_word().
60 +        This can cause an OOB write if an application uses this function with an
61 +        overly large BIGNUM. This could be a problem if an overly large certificate
62 +        or CRL is printed out from an untrusted source. TLS is not affected because
63 +        record limits will reject an oversized certificate before it is parsed.
64 +        [CVE-2016-2182]
65 +
66 +        The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
67 +        the total length the OID text representation would use and not the amount
68 +        of data written. This will result in OOB reads when large OIDs are presented.
69 +        [CVE-2016-2180]
70 +
71 +        Some calculations of limits in OpenSSL have used undefined pointer arithmetic.
72 +        This could cause problems with some malloc implementations. [CVE-2016-2177]
73 +
74 +        Operations in the DSA signing algorithm should run in constant time in order to
75 +        avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
76 +        a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
77 +
78 +        In a DTLS connection where handshake messages are delivered out-of-order those
79 +        messages that OpenSSL is not yet ready to process will be buffered for later
80 +        use. Under certain circumstances, a flaw in the logic means that those messages
81 +        do not get removed from the buffer even though the handshake has been completed.
82 +        An attacker could force up to approx. 15 messages to remain in the buffer when
83 +        they are no longer required. These messages will be cleared when the DTLS
84 +        connection is closed. The default maximum size for a message is 100k. Therefore
85 +        the attacker could force an additional 1500k to be consumed per connection.
86 +        [CVE-2016-2179]
87 +
88 +        A flaw in the DTLS replay attack protection mechanism means that records that
89 +        arrive for future epochs update the replay protection "window" before the MAC
90 +        for the record has been validated. This could be exploited by an attacker by
91 +        sending a record for the next epoch (which does not have to decrypt or have a
92 +        valid MAC), with a very large sequence number. This means that all subsequent
93 +        legitimate packets are dropped causing a denial of service for a specific
94 +        DTLS connection. [CVE-2016-2181]
95 +
96 +        In OpenSSL 1.0.2 and earlier some missing message length checks can result in
97 +        OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
98 +        DoS risk but this has not been observed in practice on common platforms.
99 +        [CVE-2016-6306]
100 +
101 + 20160918:
102 +        With the addition of auditdistd(8), a new auditdistd user is now
103 +        depended on during installworld.  "mergemaster -p" can be used to add
104 +        the user prior to installworld.
105 +
106 +        The VFS KBI was changed with the merge of several nullfs
107 +        optimizations and fixes.  All filesystem modules must be
108 +        recompiled.
109 +
110 + 20160916:
111 +        The random(4) support for the VIA hardware random number
112 +        generator (`PADLOCK') is no longer enabled unconditionally.
113 +        Add the PADLOCK_RNG option in the custom kernel config if
114 +        needed.  The GENERIC kernels on i386 and amd64 do include the
115 +        option, so the change only affects the custom kernel
116 +        configurations.
117 +
118 +        A new version of ZFS (pool version 5000) has been merged.
119 +        Starting with this version the old system of ZFS pool versioning
120 +        is superseded by "feature flags". This concept enables forward
121 +        compatibility against certain future changes in functionality of ZFS
122 +        pools. The first two read-only compatible "feature flags" for ZFS
123 +        pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
124 +        For more information read the new zpool-features(7) manual page.
125 +        Please refer to the "ZFS notes" section of this file for information
126 +        on upgrading boot ZFS pools.
127 +
128 + 20160906:
129 +        Add support for the MosChip MCS9904 four serial ports
130 +        controller.
131 +
132 +        Add support for walltimestamp in DTrace.
133 +
134 +        Various gdb improvments.
135 +
136 +        ZFS
137 +        Import the zio nop-write improvement from Illumos. To reduce I/O,
138 +        nop-write omits overwriting data if the checksum (cryptographically
139 +        secure) of new data matches the checksum of existing data.
140 +        It also saves space if snapshots are in use.
141 +
142 +        It currently works only on datasets with enabled compression, disabled
143 +        deduplication and sha256 checksums.
144 +
145 +        Add loader(8) tunable to enable/disable nopwrite functionality:
146 +        vfs.zfs.nopwrite_enabled
147 +
148 +        Introduce a new dataset aclmode setting "restricted" to protect ACL's
149 +        being destroyed or corrupted by a drive-by chmod.
150 +
151 +        New loader-only tunables:
152 +        vfs.zfs.sync_pass_deferred_free
153 +        vfs.zfs.sync_pass_dont_compress
154 +        vfs.zfs.sync_pass_rewrite
155 +
156 +        chkgrp(8) add support for q flag
157 +
158 +        Fix problem with the Samsung 840 PRO series SSD detection.
159 +        The device reports support for SATA Asynchronous Notification in its
160 +        IDENTIFY data, but returns error on attempt to enable that feature.
161 +        Make SATA XPT of CAM only report these errors, but not fail the device.
162 +
163 + 20160905:
164 +        Add a resource limit for the total number of kqueues
165 +        available to the user. Kqueue now saves the ucred of the
166 +        allocating thread, to correctly decrement the counter on close.
167 +        Based on FreeBSD SVN 256849
168 +
169 +        Import netcat from OpenBSD 5.2
170 +
171 + 20160904:
172 +        Introduced experimental TCP sysctls starting with
173 +        net.inet.tcp.experimental.initcwnd10
174 +
175 + 20160814:
176 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
177 +        in the release after the fact.
178 +
179 +        tzdata 2016a
180 +
181 + 20160811:
182 +        libdispatch 210
183 +
184 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
185 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
186 +        added WD Red drives.
187 +
188 +        Updated list of pci device vendors.
189 +
190 +        Updated list of usb devices.
191 +
192 + 20160807:
193 +        Implement several changes to libmport to fix some memory corruption issues.
194 +
195 + 20160806:
196 +        sqlite3 3.13.0
197 +
198 + 20160805:
199 +        Merged fixes for libmport that improve error handling when installing packages. Also
200 +        support mkdir -p like behavior for plist entries.
201 +
202 + 20160531:
203 +        Fix four security issues with MidnightBSD.
204 +
205 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
206 +        struct before sending to userland in the linux emulation layer.
207 +
208 +        The compat 43 stat(2) system call exposes kernel stack to userland.
209 +
210 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
211 +        cpio directory traversal and an integer signedness error in the archive
212 +        write zip data routine.
213 +
214 +
215 + 20160528:
216 +        Fixed minor issues with mined(1) and msearch(1).
217 +
218 + 20160526:
219 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
220 +
221 +        Fix libpmc(3) build with clang compiler.
222 +
223 + 20160519:
224 +        Kernel Security updates
225 +
226 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
227 +        local user to overwrite a portion of the kernel memory.
228 +
229 +        Incorrect argument handling in sendmsg(2)
230 +
231 +        Incorrect argument handling in the socket code allows malicious local
232 +        user to overwrite large portion of the kernel memory.
233 +
234 + 20160505:
235 +        OpenSSL security patch
236 +
237 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
238 +        by making sure that always the same bytes are read and compared against
239 +        either the MAC or padding bytes. But it no longer checked that there was
240 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
241 +
242 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
243 +        Base64 encoding of binary data. [CVE-2016-2105]
244 +
245 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
246 +        believed that there can be no overflows in internal code due to this problem.
247 +        [CVE-2016-2106]
248 +
249 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
250 +        a short invalid encoding can casuse allocation of large amounts of memory
251 +        potentially consuming excessive resources or exhausting memory.
252 +        [CVE-2016-2109]
253 +
254 + 20160412:
255 +        0.8 stable branch created. Continue development as 0.9.
256 +
257 +        Fix several issues with wait6 system call addition.
258 +
259 + 20160409:
260 +        libmport now supports two new plist formats:
261 +        @(root,wheel,4775) myfile
262 +        @dir(root,wheel,775) mydir
263 +
264 +        On delete, absoluate paths are now handled properly.
265 +
266 + 20160317:
267 +        OpenSSH doesn't have the luck of the Irish.
268 +
269 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
270 +        run shell commands on the call to xauth.
271 +
272 +        Incorrect argument validation in sysarch(2)
273 +
274 +        A special combination of sysarch(2) arguments, specify a request to
275 +        uninstall a set of descriptors from the LDT.  The start descriptor
276 +        is cleared and the number of descriptors are provided.  Due to invalid
277 +        use of a signed intermediate value in the bounds checking during argument
278 +        validity verification, unbound zero'ing of the process LDT and adjacent
279 +        memory can be initiated from usermode.
280 +
281 +        Patch obtained from FreeBSD.
282 +
283 + 20160229:
284 +        top now displays information on ZFS arc cache.
285 +
286 + 20160228:
287 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
288 +
289 + 20160222:
290 +        Introduce pipe2 to linux emulation layer.
291 +
292 + 20160114:
293 +        OpenSSL
294 +
295 +        The signature verification routines will crash with a NULL pointer dereference
296 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
297 +        mask generation function parameter. [CVE-2015-3194]
298 +
299 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
300 +        memory. [CVE-2015-3195]
301 +
302 +        If PSK identity hints are received by a multi-threaded client then the values
303 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
304 +
305 +        Fix security on bsnmpd configuration file during installation.
306 +
307 +        TCP MD5 signature denial of service
308 +
309 +        A programming error in processing a TCP connection with both TCP_MD5SIG
310 +        and TCP_NOOPT socket options may lead to kernel crash.
311 +
312 +        SCTP
313 +
314 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
315 +        can lead to either a failed kernel assertion or to a NULL pointer
316 +        dereference.  In either case, a kernel panic will follow.
317 +
318 + 20160102:
319 +        Happy New Year
320 +
321 + 20151101:
322 +        Increase kern.ipc.somaxconn default to 256.
323 +
324 + 20151017:
325 +        Add initial statistics api to libmport and a driver to print
326 +        it in mport(1).
327 +
328 + 20151002:
329 +        Revised rpcbind(8) patch to fix issues with NIS
330 +
331 + 20150930:
332 +        In rpcbind(8), netbuf structures are copied directly, which would result in
333 +        two netbuf structures that reference to one shared address buffer.  When one
334 +        of the two netbuf structures is freed, access to the other netbuf structure
335 +        would result in an undefined result that may crash the rpcbind(8) daemon.
336 +
337 + 20150926:
338 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
339 +        to replace @exec and @unexec.  
340 +
341 +        pre exec runs afer pre-install scripts but before actual installation
342 +
343 +        post exec runs after install but before post install scripts and
344 +        pkg message.
345 +
346 +        pre unexec runs before pre uninstall scripts
347 +
348 +        post unexec runs before de-install scripts and after file removal.
349 +
350 + 20150917:
351 +        Fix kqueue write events for files > 2GB
352 +
353 + 20150825:
354 +        kernel:
355 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
356 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
357 +
358 +        openssh:
359 +        A programming error in the privileged monitor process of the sshd(8)
360 +        service may allow the username of an already-authenticated user to be
361 +        overwritten by the unprivileged child process.
362 +
363 +        A use-after-free error in the privileged monitor process of he sshd(8)
364 +        service may be deterministically triggered by the actions of a
365 +        compromised unprivileged child process.
366 +
367 +        A use-after-free error in the session multiplexing code in the sshd(8)
368 +        service may result in unintended termination of the connection.
369 +
370 + 20150818:
371 +        expat security fix
372 +
373 + 20150815:
374 +        libc changes:
375 +        setmode(3) now returns errno consistently on error.
376 +        libc will compile without error using clang
377 +
378 + 20150814:
379 +        wait6 system call added.
380 +
381 +        date(1) now handles non numeric numbers passed to -r
382 +        like GNU coreutils for improved compatibility.
383 +
384 + 20150811:
385 +        ata(4) AMD Hudson2 SATA controller support.
386 +        Intel lynxpoint SATA.
387 +
388 +        Fix some const warnings when building several device drivers
389 +        with llvm/clang.
390 +
391 +        Sync cas(4) with FreeBSD 9-stable.
392 +
393 +        Fix some minor issues with ath(4).
394 +
395 + 20150809:
396 +        xz 5.0.8
397 +
398 + 20150808:
399 +        libmport now logs installation and removal of packages to syslog.
400 +
401 + 20150805:
402 +        routed - fix a potential security issue where traffic from outside
403 +        the network can disrupt routing.
404 +
405 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
406 +        to run.
407 +
408 + 20150802:
409 +        jansson 2.7 library added. (libjansson is a JSON library in C)
410 +
411 + 20150728:
412 +        Heimdal 1.5.2 (kerberos implementation)
413 +
414 +        OpenSSL 1.0.1o
415 +
416 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
417 +
418 +        TCP Resassemly resource exhaustion bug:
419 +        There is a mistake with the introduction of VNET, which converted the
420 +        global limit on the number of segments that could belong to reassembly
421 +        queues into a per-VNET limit.  Because mbufs are allocated from a
422 +        global pool, in the presence of a sufficient number of VNETs, the
423 +        total number of mbufs attached to reassembly queues can grow to the
424 +        total number of mbufs in the system, at which point all network
425 +        traffic would cease.
426 +        Obtained from: FreeBSD 8
427 +
428 +        OpenSSH
429 +
430 +        Fix two security vulnerabilities:
431 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
432 +        offers a certificate. [CVE-2014-2653]
433 +
434 +        OpenSSH servers which are configured to allow password authentication
435 +        using PAM (default) would allow many password attempts. A bug allows
436 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
437 +
438 +
439 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
440 +
441 + 20150726:
442 +        BSD Sort updated
443 +
444 +        sqlite 3.8.10.2
445 +
446 + 20150725:
447 +        Import reallocarray from OpenBSD's libc.  
448 +
449 +        The reallocarray() function is similar to realloc() except it operates on
450 +        nmemb members of size size and checks for integer overflow in the
451 +        calculation nmemb * size.
452 +
453 + 20150722:
454 +        Fix a bug where TCP connections transitioning to LAST_ACK
455 +        state can get stuck. This can result in a denial of service.
456 +
457   20150715:
458          libmport now supports @shell and @sample in plists. This means that
459          a shell port can automatically add an entry to /etc/shells and remove

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines