ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 6713 by laffer1, Thu Jul 10 12:18:18 2014 UTC vs.
Revision 7338 by laffer1, Wed Sep 30 13:11:05 2015 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20150930:
4 +        In rpcbind(8), netbuf structures are copied directly, which would result in
5 +        two netbuf structures that reference to one shared address buffer.  When one
6 +        of the two netbuf structures is freed, access to the other netbuf structure
7 +        would result in an undefined result that may crash the rpcbind(8) daemon.
8 +
9 + 20150926:
10 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
11 +        to replace @exec and @unexec.  
12 +
13 +        pre exec runs afer pre-install scripts but before actual installation
14 +
15 +        post exec runs after install but before post install scripts and
16 +        pkg message.
17 +
18 +        pre unexec runs before pre uninstall scripts
19 +
20 +        post unexec runs before de-install scripts and after file removal.
21 +
22 + 20150917:
23 +        Fix kqueue write events for files > 2GB
24 +
25 + 20150825:
26 +        kernel:
27 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
28 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
29 +
30 +        openssh:
31 +        A programming error in the privileged monitor process of the sshd(8)
32 +        service may allow the username of an already-authenticated user to be
33 +        overwritten by the unprivileged child process.
34 +
35 +        A use-after-free error in the privileged monitor process of he sshd(8)
36 +        service may be deterministically triggered by the actions of a
37 +        compromised unprivileged child process.
38 +
39 +        A use-after-free error in the session multiplexing code in the sshd(8)
40 +        service may result in unintended termination of the connection.
41 +
42 + 20150818:
43 +        expat security fix
44 +
45 + 20150815:
46 +        libc changes:
47 +        setmode(3) now returns errno consistently on error.
48 +        libc will compile without error using clang
49 +
50 + 20150814:
51 +        wait6 system call added.
52 +
53 +        date(1) now handles non numeric numbers passed to -r
54 +        like GNU coreutils for improved compatibility.
55 +
56 + 20150811:
57 +        ata(4) AMD Hudson2 SATA controller support.
58 +        Intel lynxpoint SATA.
59 +
60 +        Fix some const warnings when building several device drivers
61 +        with llvm/clang.
62 +
63 +        Sync cas(4) with FreeBSD 9-stable.
64 +
65 +        Fix some minor issues with ath(4).
66 +
67 + 20150809:
68 +        xz 5.0.8
69 +
70 + 20150808:
71 +        libmport now logs installation and removal of packages to syslog.
72 +
73 + 20150805:
74 +        routed - fix a potential security issue where traffic from outside
75 +        the network can disrupt routing.
76 +
77 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
78 +        to run.
79 +
80 + 20150802:
81 +        jansson 2.7 library added. (libjansson is a JSON library in C)
82 +
83 + 20150728:
84 +        Heimdal 1.5.2 (kerberos implementation)
85 +
86 +        OpenSSL 1.0.1o
87 +
88 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
89 +
90 +        TCP Resassemly resource exhaustion bug:
91 +        There is a mistake with the introduction of VNET, which converted the
92 +        global limit on the number of segments that could belong to reassembly
93 +        queues into a per-VNET limit.  Because mbufs are allocated from a
94 +        global pool, in the presence of a sufficient number of VNETs, the
95 +        total number of mbufs attached to reassembly queues can grow to the
96 +        total number of mbufs in the system, at which point all network
97 +        traffic would cease.
98 +        Obtained from: FreeBSD 8
99 +
100 +        OpenSSH
101 +
102 +        Fix two security vulnerabilities:
103 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
104 +        offers a certificate. [CVE-2014-2653]
105 +
106 +        OpenSSH servers which are configured to allow password authentication
107 +        using PAM (default) would allow many password attempts. A bug allows
108 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
109 +
110 +
111 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
112 +
113 + 20150726:
114 +        BSD Sort updated
115 +
116 +        sqlite 3.8.10.2
117 +
118 + 20150725:
119 +        Import reallocarray from OpenBSD's libc.  
120 +
121 +        The reallocarray() function is similar to realloc() except it operates on
122 +        nmemb members of size size and checks for integer overflow in the
123 +        calculation nmemb * size.
124 +
125 + 20150722:
126 +        Fix a bug where TCP connections transitioning to LAST_ACK
127 +        state can get stuck. This can result in a denial of service.
128 +
129 + 20150715:
130 +        libmport now supports @shell and @sample in plists. This means that
131 +        a shell port can automatically add an entry to /etc/shells and remove
132 +        it upon uninstallation. For sample files, a copy is made without the
133 +        .sample extension if one does not exist and it is removed automatically
134 +        only if the md5 hash of the two files is the same.
135 +
136 + 20150709:
137 +        flex 2.5.39
138 +
139 + 20150702:
140 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
141 +        with zfs set compression=lz4 pool/path.
142 +
143 +        Verify it's working with
144 +        zfs get compressratio pool/path
145 +        du -h -s *
146 +
147 +        Note you must write new data when turning on compression to see
148 +        changes. Existing files are not compressed.
149 +
150 +        Note: While we used the same basic implementation of lz4 that
151 +        FreeBSD and OpenZFS uses, we did not yet implement features support
152 +        and the zfs version still reports 28. This may come in a future update
153 +        to ZFS.
154 +
155 + 20150621:
156 +        libmport now automatically stops services when deleting packages.
157 +
158 +        The package must have installed an rc.d script in /usr/local/etc
159 +        for this to work. This is equivalent to running service <name> onestop
160 +
161 + 20150618:
162 +        Sendmail
163 +
164 +        With the recent changes to OpenSSL to block 512 bit certificates,
165 +        sendmail can't connect with TLS to some servers.
166 +
167 +        Increase the default size to 1024 bit for client connections to
168 +        match the server configuration.
169 +
170 +        ZFS
171 +
172 +        Added ZFS TRIM support which is enabled by default. To disable
173 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
174 +
175 +        Creating new ZFS pools and adding new devices to existing pools
176 +        first performs a full device level TRIM which can take a significant
177 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
178 +        to disable this behaviour.
179 +
180 +        ZFS TRIM requires the underlying device support BIO_DELETE which
181 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
182 +        via CAM, which are typically supported by SSD's.
183 +
184 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
185 +        under kstat.zfs.misc.zio_trim.
186 +
187 +        rc.d
188 +
189 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
190 +        implies everything is mounted and ready to go.
191 +
192 +        Changed how ip6addressctl maps IPv6 on startup.
193 +
194 + 20150613:
195 +        tzdata 2015d
196 +
197 + 20150612:
198 +        OpenSSL 0.9.8zg
199 +
200 + 20150419:
201 +        MidnightBSD 0.6 stable branch created. Continue 0.7
202 +        development.
203 +
204 + 20150418:
205 +        sqlite 3.8.9
206 +
207 + 20150407:
208 +        Fix two security vulnerabilities:
209 +
210 +        The previous fix for IGMP had an overflow issue. This has been corrected.
211 +
212 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
213 +        suggested Current Hop Limit value of a link, which will replace
214 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
215 +        system.
216 +
217 + 20150319:
218 +        OpenSSL 0.9.8.zf
219 +
220 +        mksh R50e
221 +
222 +        Apple mDNSResponder 561.1.1
223 +
224 + 20150306:
225 +        Upgrade OpenSSL to 0.9.8ze
226 +
227 + 20150225:
228 +        Fix two security vulnerabilities.
229 +
230 +        1. BIND servers which are configured to perform DNSSEC validation and which
231 +        are using managed keys (which occurs implicitly when using
232 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
233 +        unpredictable behavior due to the use of an improperly initialized
234 +        variable.
235 +
236 +        CVE-2015-1349
237 +
238 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
239 +        in a buffer which is too small for the requested operation.
240 +
241 +        This can result in a DOS attack.
242 +
243 + 20141211:
244 +        Fix a security issue with file and libmagic that can allow
245 +        an attacker to create a denial of service attack on any
246 +        program that uses libmagic.
247 +
248 + 20141109:
249 +        Fix building perl during buildworld when the GDBM port is installed.
250 +
251 + 20141106:
252 +        tzdata 2014i
253 +
254 + 20141102:
255 +        serf 1.3.8
256 +
257 + 20141031:
258 +        tnftp 20141031 fixes a security vulnerability with tnftp,
259 +        CVE-2014-8517.
260 +
261 + 20141028:
262 +        OpenSSL 0.9.8zc
263 +
264 + 20141021:
265 +        Fix several security vulnerabilities in routed, rtsold,
266 +        and namei with respect to Capsicum sandboxes looking up
267 +        nonexistent path names and leaking memory.
268 +
269 +        The input path in routed(8) will accept queries from any source and
270 +        attempt to answer them.  However, the output path assumes that the
271 +        destination address for the response is on a directly connected
272 +        network.
273 +
274 +        Due to a missing length check in the code that handles DNS parameters,
275 +        a malformed router advertisement message can result in a stack buffer
276 +        overflow in rtsold(8).
277 +
278 + 20141011:
279 +        mksh R50d - fix field splitting regression and null
280 +        pointer dereference
281 +
282 +        xz 5.0.7
283 +
284 +        OpenSSH 6.6p1
285 +
286 + 20141004:
287 +        mksh R50c - security update for environment var bug with
288 +        foo vs foo+    
289 +
290 + 20141002:
291 +        sqlite 3.8.6
292 +
293 +        sudo 1.7.8 - some issues with the current version, but we're slowly
294 +        getting up to date.
295 +
296 + 20141001:
297 +        mksh R50b
298 +
299 +        libmport now supports plist commands @dir, @owner, @group, @mode.
300 +
301 +        sudo 1.7.6p2
302 +
303 + 20140916:
304 +        Fix a security issue with TCP SYN.
305 +
306 +        When a segment with the SYN flag for an already existing connection arrives,
307 +        the TCP stack tears down the connection, bypassing a check that the
308 +        sequence number in the segment is in the expected window.
309 +
310 + 20140909:
311 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
312 +        with some programs including Dovecot.
313 +
314 +        OpenSSL security patch:
315 +
316 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
317 +        to consume large amounts of memory. [CVE-2014-3506]
318 +
319 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
320 +        memory. [CVE-2014-3507]
321 +
322 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
323 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
324 +        the stack. [CVE-2014-3508]
325 +
326 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
327 +        a denial of service attack. [CVE-2014-3510]
328 +
329 + 20140902:
330 +        We're now 0.6-CURRENT
331 +
332 +        Update USB quirks to support K70 Corsair keyboard, and several
333 +        other devices.
334 +
335 + 20140827:
336 +        Perl 5.18.2
337 +
338 + 20140728:
339 +        Jails now run shutdown scripts.
340 +
341   20140710:
342          Fix a vulnerability in the control message API. A buffer is not properly cleared
343          before sharing with userland.

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines