ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 3394 by laffer1, Sat May 1 00:14:17 2010 UTC vs.
Revision 9534 by laffer1, Sun Aug 20 00:04:01 2017 UTC

# Line 1 | Line 1
1 < Updating Information for MidnightBSD users
1 > Updating Information for MidnightBSD users.
2  
3 + 20170819:
4 +        Heimdal KDC-REP service name validation vulerability patched.
5 +
6 +        Introduce a partial fix for AMD Ryzen issues. On Ryzen, move
7 +        the lower shared page by one.
8 +
9 + 20170326:
10 +        sudo removed from base. Use doas(1) or install sudo from mports
11 +
12 +        Stable 0.9 created, continue development on 0.10
13 +
14 + 20170305:
15 +        Add hast module to bsnmpd
16 +
17 + 20170302:
18 +        add a callback to the ada(4) driver so that it knows when
19 +        GEOM has released references to it.
20 +
21 + 20170219:
22 +        Add /dev/full device.
23 +
24 +        The lindev device has been removed since /dev/full has been made a
25 +        standard device.
26 +
27 +        Serf 1.3.9
28 +        Subversion 1.8.10
29 +        apr 1.5.2
30 +        apr-util 1.5.4
31 +
32 + 20170129:
33 +        add doas utility from OpenBSD.
34 +
35 + 20161105:
36 +        BIND 9.9.9-p4
37 +
38 +        OpenSSH 7.3p1
39 +
40 + 20161103:
41 +        OpenSSL security patch
42 +
43 +        Due to improper handling of alert packets, OpenSSL would consume an excessive
44 +        amount of CPU time processing undefined alert messages.
45 +
46 + 20161015:
47 +        libarchive 3.2.1
48 +
49 +        xz 5.2.2
50 +
51 + 20161013:
52 +        Sync ZFS code with Illuminos/FreeBSD 9.2. Added support for
53 +        feature flags, pool version 5000. This also includes some
54 +        bug fixes and performance optimizations.
55 +
56 + 20160925:
57 +        Import NetBSD vis(3) and unvis(3) as well as mtree.
58 +
59 +        one-true-awk 20121220
60 +
61 +        inetd now honors kern.ipc.somaxconn value.
62 +
63 +        netmap synced with FreeBSD 9.2
64 +
65 +        linuxolator now has dtrace probes.
66 +
67 +        bsdgrep now correctly handles -m to exclude only one file.
68 +
69 +        UFS file systems can now be resized in read-write mode due to the new
70 +        write suspension feature.
71 +
72 +        Basic support added for Intel Raid Recover Technology.
73 +
74 +        GMIRROR & GRAID3 now mark volumes clean on shutdown earlier to help with ZFS issues.
75 +
76 +        Highpoint hpt27xx now in GENERIC kernel.
77 +
78 + 20160923:
79 +        Security update for OpenSSL
80 +
81 +        A malicious client can send an excessively large OCSP Status Request extension.
82 +        If that client continually requests renegotiation, sending a large OCSP Status
83 +        Request extension each time, then there will be unbounded memory growth on the
84 +        server. [CVE-2016-6304]
85 +
86 +        An overflow can occur in MDC2_Update() either if called directly or through
87 +        the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
88 +        very large amounts of input data after a previous call to EVP_EncryptUpdate()
89 +        with a partial block then a length check can overflow resulting in a heap
90 +        corruption. [CVE-2016-6303]
91 +
92 +        If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
93 +        DoS attack where a malformed ticket will result in an OOB read which will
94 +        ultimately crash. [CVE-2016-6302]
95 +
96 +        The function BN_bn2dec() does not check the return value of BN_div_word().
97 +        This can cause an OOB write if an application uses this function with an
98 +        overly large BIGNUM. This could be a problem if an overly large certificate
99 +        or CRL is printed out from an untrusted source. TLS is not affected because
100 +        record limits will reject an oversized certificate before it is parsed.
101 +        [CVE-2016-2182]
102 +
103 +        The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
104 +        the total length the OID text representation would use and not the amount
105 +        of data written. This will result in OOB reads when large OIDs are presented.
106 +        [CVE-2016-2180]
107 +
108 +        Some calculations of limits in OpenSSL have used undefined pointer arithmetic.
109 +        This could cause problems with some malloc implementations. [CVE-2016-2177]
110 +
111 +        Operations in the DSA signing algorithm should run in constant time in order to
112 +        avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
113 +        a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
114 +
115 +        In a DTLS connection where handshake messages are delivered out-of-order those
116 +        messages that OpenSSL is not yet ready to process will be buffered for later
117 +        use. Under certain circumstances, a flaw in the logic means that those messages
118 +        do not get removed from the buffer even though the handshake has been completed.
119 +        An attacker could force up to approx. 15 messages to remain in the buffer when
120 +        they are no longer required. These messages will be cleared when the DTLS
121 +        connection is closed. The default maximum size for a message is 100k. Therefore
122 +        the attacker could force an additional 1500k to be consumed per connection.
123 +        [CVE-2016-2179]
124 +
125 +        A flaw in the DTLS replay attack protection mechanism means that records that
126 +        arrive for future epochs update the replay protection "window" before the MAC
127 +        for the record has been validated. This could be exploited by an attacker by
128 +        sending a record for the next epoch (which does not have to decrypt or have a
129 +        valid MAC), with a very large sequence number. This means that all subsequent
130 +        legitimate packets are dropped causing a denial of service for a specific
131 +        DTLS connection. [CVE-2016-2181]
132 +
133 +        In OpenSSL 1.0.2 and earlier some missing message length checks can result in
134 +        OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
135 +        DoS risk but this has not been observed in practice on common platforms.
136 +        [CVE-2016-6306]
137 +
138 + 20160918:
139 +        With the addition of auditdistd(8), a new auditdistd user is now
140 +        depended on during installworld.  "mergemaster -p" can be used to add
141 +        the user prior to installworld.
142 +
143 +        The VFS KBI was changed with the merge of several nullfs
144 +        optimizations and fixes.  All filesystem modules must be
145 +        recompiled.
146 +
147 + 20160916:
148 +        The random(4) support for the VIA hardware random number
149 +        generator (`PADLOCK') is no longer enabled unconditionally.
150 +        Add the PADLOCK_RNG option in the custom kernel config if
151 +        needed.  The GENERIC kernels on i386 and amd64 do include the
152 +        option, so the change only affects the custom kernel
153 +        configurations.
154 +
155 +        A new version of ZFS (pool version 5000) has been merged.
156 +        Starting with this version the old system of ZFS pool versioning
157 +        is superseded by "feature flags". This concept enables forward
158 +        compatibility against certain future changes in functionality of ZFS
159 +        pools. The first two read-only compatible "feature flags" for ZFS
160 +        pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
161 +        For more information read the new zpool-features(7) manual page.
162 +        Please refer to the "ZFS notes" section of this file for information
163 +        on upgrading boot ZFS pools.
164 +
165 + 20160906:
166 +        Add support for the MosChip MCS9904 four serial ports
167 +        controller.
168 +
169 +        Add support for walltimestamp in DTrace.
170 +
171 +        Various gdb improvments.
172 +
173 +        ZFS
174 +        Import the zio nop-write improvement from Illumos. To reduce I/O,
175 +        nop-write omits overwriting data if the checksum (cryptographically
176 +        secure) of new data matches the checksum of existing data.
177 +        It also saves space if snapshots are in use.
178 +
179 +        It currently works only on datasets with enabled compression, disabled
180 +        deduplication and sha256 checksums.
181 +
182 +        Add loader(8) tunable to enable/disable nopwrite functionality:
183 +        vfs.zfs.nopwrite_enabled
184 +
185 +        Introduce a new dataset aclmode setting "restricted" to protect ACL's
186 +        being destroyed or corrupted by a drive-by chmod.
187 +
188 +        New loader-only tunables:
189 +        vfs.zfs.sync_pass_deferred_free
190 +        vfs.zfs.sync_pass_dont_compress
191 +        vfs.zfs.sync_pass_rewrite
192 +
193 +        chkgrp(8) add support for q flag
194 +
195 +        Fix problem with the Samsung 840 PRO series SSD detection.
196 +        The device reports support for SATA Asynchronous Notification in its
197 +        IDENTIFY data, but returns error on attempt to enable that feature.
198 +        Make SATA XPT of CAM only report these errors, but not fail the device.
199 +
200 + 20160905:
201 +        Add a resource limit for the total number of kqueues
202 +        available to the user. Kqueue now saves the ucred of the
203 +        allocating thread, to correctly decrement the counter on close.
204 +        Based on FreeBSD SVN 256849
205 +
206 +        Import netcat from OpenBSD 5.2
207 +
208 + 20160904:
209 +        Introduced experimental TCP sysctls starting with
210 +        net.inet.tcp.experimental.initcwnd10
211 +
212 + 20160814:
213 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
214 +        in the release after the fact.
215 +
216 +        tzdata 2016a
217 +
218 + 20160811:
219 +        libdispatch 210
220 +
221 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
222 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
223 +        added WD Red drives.
224 +
225 +        Updated list of pci device vendors.
226 +
227 +        Updated list of usb devices.
228 +
229 + 20160807:
230 +        Implement several changes to libmport to fix some memory corruption issues.
231 +
232 + 20160806:
233 +        sqlite3 3.13.0
234 +
235 + 20160805:
236 +        Merged fixes for libmport that improve error handling when installing packages. Also
237 +        support mkdir -p like behavior for plist entries.
238 +
239 + 20160531:
240 +        Fix four security issues with MidnightBSD.
241 +
242 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
243 +        struct before sending to userland in the linux emulation layer.
244 +
245 +        The compat 43 stat(2) system call exposes kernel stack to userland.
246 +
247 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
248 +        cpio directory traversal and an integer signedness error in the archive
249 +        write zip data routine.
250 +
251 +
252 + 20160528:
253 +        Fixed minor issues with mined(1) and msearch(1).
254 +
255 + 20160526:
256 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
257 +
258 +        Fix libpmc(3) build with clang compiler.
259 +
260 + 20160519:
261 +        Kernel Security updates
262 +
263 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
264 +        local user to overwrite a portion of the kernel memory.
265 +
266 +        Incorrect argument handling in sendmsg(2)
267 +
268 +        Incorrect argument handling in the socket code allows malicious local
269 +        user to overwrite large portion of the kernel memory.
270 +
271 + 20160505:
272 +        OpenSSL security patch
273 +
274 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
275 +        by making sure that always the same bytes are read and compared against
276 +        either the MAC or padding bytes. But it no longer checked that there was
277 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
278 +
279 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
280 +        Base64 encoding of binary data. [CVE-2016-2105]
281 +
282 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
283 +        believed that there can be no overflows in internal code due to this problem.
284 +        [CVE-2016-2106]
285 +
286 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
287 +        a short invalid encoding can casuse allocation of large amounts of memory
288 +        potentially consuming excessive resources or exhausting memory.
289 +        [CVE-2016-2109]
290 +
291 + 20160412:
292 +        0.8 stable branch created. Continue development as 0.9.
293 +
294 +        Fix several issues with wait6 system call addition.
295 +
296 + 20160409:
297 +        libmport now supports two new plist formats:
298 +        @(root,wheel,4775) myfile
299 +        @dir(root,wheel,775) mydir
300 +
301 +        On delete, absoluate paths are now handled properly.
302 +
303 + 20160317:
304 +        OpenSSH doesn't have the luck of the Irish.
305 +
306 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
307 +        run shell commands on the call to xauth.
308 +
309 +        Incorrect argument validation in sysarch(2)
310 +
311 +        A special combination of sysarch(2) arguments, specify a request to
312 +        uninstall a set of descriptors from the LDT.  The start descriptor
313 +        is cleared and the number of descriptors are provided.  Due to invalid
314 +        use of a signed intermediate value in the bounds checking during argument
315 +        validity verification, unbound zero'ing of the process LDT and adjacent
316 +        memory can be initiated from usermode.
317 +
318 +        Patch obtained from FreeBSD.
319 +
320 + 20160229:
321 +        top now displays information on ZFS arc cache.
322 +
323 + 20160228:
324 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
325 +
326 + 20160222:
327 +        Introduce pipe2 to linux emulation layer.
328 +
329 + 20160114:
330 +        OpenSSL
331 +
332 +        The signature verification routines will crash with a NULL pointer dereference
333 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
334 +        mask generation function parameter. [CVE-2015-3194]
335 +
336 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
337 +        memory. [CVE-2015-3195]
338 +
339 +        If PSK identity hints are received by a multi-threaded client then the values
340 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
341 +
342 +        Fix security on bsnmpd configuration file during installation.
343 +
344 +        TCP MD5 signature denial of service
345 +
346 +        A programming error in processing a TCP connection with both TCP_MD5SIG
347 +        and TCP_NOOPT socket options may lead to kernel crash.
348 +
349 +        SCTP
350 +
351 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
352 +        can lead to either a failed kernel assertion or to a NULL pointer
353 +        dereference.  In either case, a kernel panic will follow.
354 +
355 + 20160102:
356 +        Happy New Year
357 +
358 + 20151101:
359 +        Increase kern.ipc.somaxconn default to 256.
360 +
361 + 20151017:
362 +        Add initial statistics api to libmport and a driver to print
363 +        it in mport(1).
364 +
365 + 20151002:
366 +        Revised rpcbind(8) patch to fix issues with NIS
367 +
368 + 20150930:
369 +        In rpcbind(8), netbuf structures are copied directly, which would result in
370 +        two netbuf structures that reference to one shared address buffer.  When one
371 +        of the two netbuf structures is freed, access to the other netbuf structure
372 +        would result in an undefined result that may crash the rpcbind(8) daemon.
373 +
374 + 20150926:
375 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
376 +        to replace @exec and @unexec.  
377 +
378 +        pre exec runs afer pre-install scripts but before actual installation
379 +
380 +        post exec runs after install but before post install scripts and
381 +        pkg message.
382 +
383 +        pre unexec runs before pre uninstall scripts
384 +
385 +        post unexec runs before de-install scripts and after file removal.
386 +
387 + 20150917:
388 +        Fix kqueue write events for files > 2GB
389 +
390 + 20150825:
391 +        kernel:
392 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
393 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
394 +
395 +        openssh:
396 +        A programming error in the privileged monitor process of the sshd(8)
397 +        service may allow the username of an already-authenticated user to be
398 +        overwritten by the unprivileged child process.
399 +
400 +        A use-after-free error in the privileged monitor process of he sshd(8)
401 +        service may be deterministically triggered by the actions of a
402 +        compromised unprivileged child process.
403 +
404 +        A use-after-free error in the session multiplexing code in the sshd(8)
405 +        service may result in unintended termination of the connection.
406 +
407 + 20150818:
408 +        expat security fix
409 +
410 + 20150815:
411 +        libc changes:
412 +        setmode(3) now returns errno consistently on error.
413 +        libc will compile without error using clang
414 +
415 + 20150814:
416 +        wait6 system call added.
417 +
418 +        date(1) now handles non numeric numbers passed to -r
419 +        like GNU coreutils for improved compatibility.
420 +
421 + 20150811:
422 +        ata(4) AMD Hudson2 SATA controller support.
423 +        Intel lynxpoint SATA.
424 +
425 +        Fix some const warnings when building several device drivers
426 +        with llvm/clang.
427 +
428 +        Sync cas(4) with FreeBSD 9-stable.
429 +
430 +        Fix some minor issues with ath(4).
431 +
432 + 20150809:
433 +        xz 5.0.8
434 +
435 + 20150808:
436 +        libmport now logs installation and removal of packages to syslog.
437 +
438 + 20150805:
439 +        routed - fix a potential security issue where traffic from outside
440 +        the network can disrupt routing.
441 +
442 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
443 +        to run.
444 +
445 + 20150802:
446 +        jansson 2.7 library added. (libjansson is a JSON library in C)
447 +
448 + 20150728:
449 +        Heimdal 1.5.2 (kerberos implementation)
450 +
451 +        OpenSSL 1.0.1o
452 +
453 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
454 +
455 +        TCP Resassemly resource exhaustion bug:
456 +        There is a mistake with the introduction of VNET, which converted the
457 +        global limit on the number of segments that could belong to reassembly
458 +        queues into a per-VNET limit.  Because mbufs are allocated from a
459 +        global pool, in the presence of a sufficient number of VNETs, the
460 +        total number of mbufs attached to reassembly queues can grow to the
461 +        total number of mbufs in the system, at which point all network
462 +        traffic would cease.
463 +        Obtained from: FreeBSD 8
464 +
465 +        OpenSSH
466 +
467 +        Fix two security vulnerabilities:
468 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
469 +        offers a certificate. [CVE-2014-2653]
470 +
471 +        OpenSSH servers which are configured to allow password authentication
472 +        using PAM (default) would allow many password attempts. A bug allows
473 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
474 +
475 +
476 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
477 +
478 + 20150726:
479 +        BSD Sort updated
480 +
481 +        sqlite 3.8.10.2
482 +
483 + 20150725:
484 +        Import reallocarray from OpenBSD's libc.  
485 +
486 +        The reallocarray() function is similar to realloc() except it operates on
487 +        nmemb members of size size and checks for integer overflow in the
488 +        calculation nmemb * size.
489 +
490 + 20150722:
491 +        Fix a bug where TCP connections transitioning to LAST_ACK
492 +        state can get stuck. This can result in a denial of service.
493 +
494 + 20150715:
495 +        libmport now supports @shell and @sample in plists. This means that
496 +        a shell port can automatically add an entry to /etc/shells and remove
497 +        it upon uninstallation. For sample files, a copy is made without the
498 +        .sample extension if one does not exist and it is removed automatically
499 +        only if the md5 hash of the two files is the same.
500 +
501 + 20150709:
502 +        flex 2.5.39
503 +
504 + 20150702:
505 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
506 +        with zfs set compression=lz4 pool/path.
507 +
508 +        Verify it's working with
509 +        zfs get compressratio pool/path
510 +        du -h -s *
511 +
512 +        Note you must write new data when turning on compression to see
513 +        changes. Existing files are not compressed.
514 +
515 +        Note: While we used the same basic implementation of lz4 that
516 +        FreeBSD and OpenZFS uses, we did not yet implement features support
517 +        and the zfs version still reports 28. This may come in a future update
518 +        to ZFS.
519 +
520 + 20150621:
521 +        libmport now automatically stops services when deleting packages.
522 +
523 +        The package must have installed an rc.d script in /usr/local/etc
524 +        for this to work. This is equivalent to running service <name> onestop
525 +
526 + 20150618:
527 +        Sendmail
528 +
529 +        With the recent changes to OpenSSL to block 512 bit certificates,
530 +        sendmail can't connect with TLS to some servers.
531 +
532 +        Increase the default size to 1024 bit for client connections to
533 +        match the server configuration.
534 +
535 +        ZFS
536 +
537 +        Added ZFS TRIM support which is enabled by default. To disable
538 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
539 +
540 +        Creating new ZFS pools and adding new devices to existing pools
541 +        first performs a full device level TRIM which can take a significant
542 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
543 +        to disable this behaviour.
544 +
545 +        ZFS TRIM requires the underlying device support BIO_DELETE which
546 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
547 +        via CAM, which are typically supported by SSD's.
548 +
549 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
550 +        under kstat.zfs.misc.zio_trim.
551 +
552 +        rc.d
553 +
554 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
555 +        implies everything is mounted and ready to go.
556 +
557 +        Changed how ip6addressctl maps IPv6 on startup.
558 +
559 + 20150613:
560 +        tzdata 2015d
561 +
562 + 20150612:
563 +        OpenSSL 0.9.8zg
564 +
565 + 20150419:
566 +        MidnightBSD 0.6 stable branch created. Continue 0.7
567 +        development.
568 +
569 + 20150418:
570 +        sqlite 3.8.9
571 +
572 + 20150407:
573 +        Fix two security vulnerabilities:
574 +
575 +        The previous fix for IGMP had an overflow issue. This has been corrected.
576 +
577 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
578 +        suggested Current Hop Limit value of a link, which will replace
579 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
580 +        system.
581 +
582 + 20150319:
583 +        OpenSSL 0.9.8.zf
584 +
585 +        mksh R50e
586 +
587 +        Apple mDNSResponder 561.1.1
588 +
589 + 20150306:
590 +        Upgrade OpenSSL to 0.9.8ze
591 +
592 + 20150225:
593 +        Fix two security vulnerabilities.
594 +
595 +        1. BIND servers which are configured to perform DNSSEC validation and which
596 +        are using managed keys (which occurs implicitly when using
597 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
598 +        unpredictable behavior due to the use of an improperly initialized
599 +        variable.
600 +
601 +        CVE-2015-1349
602 +
603 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
604 +        in a buffer which is too small for the requested operation.
605 +
606 +        This can result in a DOS attack.
607 +
608 + 20141211:
609 +        Fix a security issue with file and libmagic that can allow
610 +        an attacker to create a denial of service attack on any
611 +        program that uses libmagic.
612 +
613 + 20141109:
614 +        Fix building perl during buildworld when the GDBM port is installed.
615 +
616 + 20141106:
617 +        tzdata 2014i
618 +
619 + 20141102:
620 +        serf 1.3.8
621 +
622 + 20141031:
623 +        tnftp 20141031 fixes a security vulnerability with tnftp,
624 +        CVE-2014-8517.
625 +
626 + 20141028:
627 +        OpenSSL 0.9.8zc
628 +
629 + 20141021:
630 +        Fix several security vulnerabilities in routed, rtsold,
631 +        and namei with respect to Capsicum sandboxes looking up
632 +        nonexistent path names and leaking memory.
633 +
634 +        The input path in routed(8) will accept queries from any source and
635 +        attempt to answer them.  However, the output path assumes that the
636 +        destination address for the response is on a directly connected
637 +        network.
638 +
639 +        Due to a missing length check in the code that handles DNS parameters,
640 +        a malformed router advertisement message can result in a stack buffer
641 +        overflow in rtsold(8).
642 +
643 + 20141011:
644 +        mksh R50d - fix field splitting regression and null
645 +        pointer dereference
646 +
647 +        xz 5.0.7
648 +
649 +        OpenSSH 6.6p1
650 +
651 + 20141004:
652 +        mksh R50c - security update for environment var bug with
653 +        foo vs foo+    
654 +
655 + 20141002:
656 +        sqlite 3.8.6
657 +
658 +        sudo 1.7.8 - some issues with the current version, but we're slowly
659 +        getting up to date.
660 +
661 + 20141001:
662 +        mksh R50b
663 +
664 +        libmport now supports plist commands @dir, @owner, @group, @mode.
665 +
666 +        sudo 1.7.6p2
667 +
668 + 20140916:
669 +        Fix a security issue with TCP SYN.
670 +
671 +        When a segment with the SYN flag for an already existing connection arrives,
672 +        the TCP stack tears down the connection, bypassing a check that the
673 +        sequence number in the segment is in the expected window.
674 +
675 + 20140909:
676 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
677 +        with some programs including Dovecot.
678 +
679 +        OpenSSL security patch:
680 +
681 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
682 +        to consume large amounts of memory. [CVE-2014-3506]
683 +
684 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
685 +        memory. [CVE-2014-3507]
686 +
687 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
688 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
689 +        the stack. [CVE-2014-3508]
690 +
691 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
692 +        a denial of service attack. [CVE-2014-3510]
693 +
694 + 20140902:
695 +        We're now 0.6-CURRENT
696 +
697 +        Update USB quirks to support K70 Corsair keyboard, and several
698 +        other devices.
699 +
700 + 20140827:
701 +        Perl 5.18.2
702 +
703 + 20140728:
704 +        Jails now run shutdown scripts.
705 +
706 + 20140710:
707 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
708 +        before sharing with userland.
709 +
710 + 20140701:
711 +        MKSH R50
712 +
713 + 20140630:
714 +        File 5.19
715 +
716 + 20140605:
717 +        Fix four security issues with OpenSSL
718 +
719 + 20140604:
720 +        Sendmail failed to properly set close-on-exec for open file descriptors.
721 +
722 +        ktrace page fault kernel trace entries were set to an incorrect size which resulted
723 +        in a leak of information.
724 +
725 + 20140430:
726 +        Fix a TCP reassembly bug that could result in a DOS attack
727 +        of the system. It may be possible to obtain portions
728 +        of kernel memory as well.
729 +
730 + 20140411:
731 +        Update zlib to 1.2.7
732 +
733 + 20140122:
734 +        Support for username with length 32. Previous limit was 16
735 +
736 + 20140114:
737 +        Fix two security vulnerabilities.
738 +
739 +        bsnmpd contains a stack overflow when sent certain queries.
740 +
741 +        bind 9.8 when using NSEC3-signed zones zones, will crash with special
742 +        crafted packets.
743 +
744 + 20131228:
745 +        Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
746 +
747 +        Updated em(4), igb(4) and ixgbe(4)
748 +
749 +        MidnightBSD now works with Z87 Intel chipsets.
750 +
751 + 20131207:
752 +        Remove sparc64 architecture. It hasn't been working for awhile
753 +        and it's not useful for desktops anymore.
754 +
755 + 20131205:
756 +        OpenSSH 6.4p1
757 +
758 + 20131203:
759 +        Perl 5.18.1 imported.
760 +
761 +        Update less to v458
762 +
763 + 20131130:
764 +        Remove named from base. We still include the client utilities for
765 +        now until replacements can be found.
766 +
767 + 20131004:
768 +        rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
769 +
770 + 20130917:
771 +        Support for 65,536 routing tables was added.  A new fib specific
772 +        field has been added to mbuf.  This is an increase from 16.
773 +
774 + 20130910:
775 +        Security updates: (kern.osreldate 5001)
776 +
777 +        nullfs(5)
778 +
779 +        The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
780 +        check whether the source and target of the link are both in the same
781 +        nullfs instance.  It is therefore possible to create a hardlink from a
782 +        location in one nullfs instance to a file in another, as long as the
783 +        underlying (source) filesystem is the same.
784 +
785 +        ifioctl
786 +
787 +        As is commonly the case, the IPv6 and ATM network layer ioctl request
788 +        handlers are written in such a way that an unrecognized request is
789 +        passed on unmodified to the link layer, which will either handle it or
790 +        return an error code.
791 +
792 +        Network interface drivers, however, assume that the SIOCSIFADDR,
793 +        SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
794 +        handled at the network layer, and therefore do not perform input
795 +        validation or verify the caller's credentials.  Typical link-layer
796 +        actions for these requests may include marking the interface as "up"
797 +        and resetting the underlying hardware.
798 +
799 + 20130824:
800 +        Fix a bug in sendmail 8.14.7 that interferes with how it
801 +        handles AAAA records interoperating with Microsoft DNS servers.
802 +        FreeBSD has already reported this to Sendmail and a fix
803 +        will be included in the next release.
804 +
805 +        Subversion 1.8.1 is now in the base system as a static
806 +        binary.  It has limited functionality, but can be used to
807 +        checkout/commit code.  It is named svnlite.
808 +
809 + 20130822:
810 +        Fix two security vulnerabilities.
811 +
812 +        Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
813 +        This could be exploited to read memory by a user process.
814 +
815 +        When initializing the SCTP state cookie being sent in INIT-ACK chunks,
816 +        a buffer allocated from the kernel stack is not completely initialized.
817 +
818 +        Import xz 5.0.4
819 +
820 +        Import sqlite 3.7.17
821 +
822 +        Import BIND 9.8.5-P2
823 +
824 + 20130814:
825 +        mksh R48 imported.
826 +
827 +        Sendmail 8.14.7 imported.
828 +
829 + 20130717:
830 +        libmport bug was fixed causing hash verification to fail.
831 +
832 +        virtio(4) imported from FreeBSD 9-stable. SCSI support not
833 +        included.
834 +
835 + 20130612:
836 +        RELENG_0_4 created for 0.4. Development continues on 0.5.
837 +
838 + 20130402:
839 +        Update BIND and OpenSSL to resolve security advisories.
840 +
841 + 20130305:
842 +        MKSH R44 imported.
843 +
844 + 20130213:
845 +        MKSH R42b imported
846 +
847 + 20130211:
848 +        MKSH R42 imported
849 +
850 + 20130125:
851 +        MKSH R41 imported
852 +
853 + 20130122:
854 +        OpenSSH 5.8p2 imported
855 +
856 +        SQLite 3.7.15.2 imported
857 +
858 +        Fixed a longstanding bug in libmport extrating new index files.
859 +
860 + 20120710:
861 +        BSD licensed sort imported from FreeBSD-CURRENT
862 +
863 +        For now, GNU sort is installed as gnusort, but it will
864 +        go away in time.
865 +
866 + 20120708:
867 +        tcsh 6.18.01 imported.
868 +
869 +        NetBSD's iconv imported.
870 +
871 +        libc gains strnlen(3), memrchr(3), stpncpy(3).
872 +
873 + 20120612:
874 +        BIND security update related to CVE-2012-1667.
875 +
876 +        Zero length resource records can cause BIND to crash resulting
877 +        in a DOS attack or information disclosure.
878 +
879 + 20120407:
880 +        mksh R40f (fixes regression)
881 +
882 + 20120328:
883 +        mksh R40e
884 +
885 +        Perl 5.14.2
886 +
887 + 20120229:
888 +        cpucontrol(8) and cpuctl(4) added from FreeBSD 7-stable.
889 +
890 + 20120209:
891 +        mDNSResponder 333.10 imported
892 +
893 + 20111227:
894 +        import raid5 module for GEOM, graid5(8)
895 +
896 +        This is experimental and known to use a lot of kernel
897 +        memory.
898 +
899 + 20111223:
900 +        telnetd: fix a root exploit from a fixed buffer that was not checked
901 +
902 +        pam: don't allow escape from policy path.  Exploitable in KDE, etc.
903 +
904 +        Fix pam_ssh module:
905 +
906 +        If the pam_ssh module is enabled, attackers may be able to gain access
907 +        to user accounts which have unencrypted SSH private keys.
908 +
909 +        This has to due with the way that openssl works.  It ignores unencrpted data.
910 +
911 +        Fix security issue with chroot and ftpd.
912 +
913 +        nsdispatch(3) doesn't know it's working in a chroot and some
914 +        operations can cause files to get reloaded causing a security
915 +        hole in things like ftpd.
916 +
917 + 20111217:
918 +        libdialog/dialog upgraded to an lgpl version. As it's not
919 +        backwardly compatable, include the old libdialog as libodialog
920 +
921 + 20111212:
922 +        mksh r40d imported
923 +
924 + 20111210:
925 +        re(4) and rl(4) updated to support new chips.
926 +
927 +        GEOM synced with FreeBSD 7-stable.
928 +
929 +        MidnightBSD GPT partition types created in sys/gpt.h and
930 +        setup in boot loader and GEOM.
931 +
932 +        amdsbwd(4) (amd watchdog for south bridge) updated to support
933 +        8xx series chipset.
934 +
935 + 20111207:
936 +        import bsd grep from FreeBSD/OpenBSD.
937 +
938 +        MK_BSD_GREP controls which grep is installed
939 +        as grep with the other as bsdgrep or gnugrep.
940 +
941 + 20111122:
942 +        mksh vR40c imported.
943 +
944 + 20111117:
945 +        BIND 9.6 ESV R5 P1
946 +
947 + 20111107:
948 +        tzdata 2011n
949 +
950 + 20111026:
951 +        mDNSResponder v320
952 +
953 +        BIND 9.6 ESV R5
954 +
955 + 20111022:
956 +        cflow 0.0.6 imported
957 +
958 + 20111020:
959 +        less v436 imported
960 +
961 +        amdsbwd(4) AMD southbridge watchdog
962 +
963 + 20111019:
964 +        awk 20110810 imported
965 +
966 +        et(4) Agere Gigabit Ethernet/Fast Ethernet driver added, but
967 +        not included in GENERIC kernel.  The kernel module needs
968 +        testing before we can include it in GENERIC.
969 +
970 +        intr_bind code ported to allow an IRQ to be bound to one
971 +        specific CPU core.
972 +
973 + 20111017:
974 +        Time Zone Data v. 2011l (Released 10 October 2011)
975 +
976 +        Updated list of countries (iso3166) to work with new timezone data.
977 +
978 + 20111015:
979 +        Introduce CPU Affinity in MidnightBSD. cpuset(1) can be used
980 +        to control which core or group of cores can be used for a given
981 +        process. Several new system calls were added to support this
982 +        functionality in the running kernel and for 32bit binary
983 +        compatibility on amd64.
984 +
985 +        The scheduler default has been changed to ULE in i386 and
986 +        amd64.  Changes were made to both schedulers (4BSD AND ULE)
987 +        for this feature.
988 +
989 +        This work is based on Jeff Roberson's FreeBSD 7.1 patches.
990 +
991 + 20111004:
992 +        Fix a problem with unix socket handling caused by the recent
993 +        patch to unix socket path handling. This allows network
994 +        apps to work under the linuxolator again.
995 +
996 + 20111001:
997 +        Import libfetch & fetch(1) from FreeBSD 9. Passive FTP is
998 +        now default and an environment variable must be set to use
999 +        active.
1000 +
1001 + 20110930:
1002 +        Introduce quirks handling for several umass devices including
1003 +        USB cameras.  Add workaround for Cyberpower UPS devices.
1004 +
1005 +        Bring in further bug fixes from FreeBSD and NetBSD for alc(4).
1006 +        Stale ip/tcp header pointers are no longer used, lockups fixed
1007 +        when network cable is unplugged on bootup, enable TX checksum
1008 +        offloading.
1009 +
1010 +        Add a new man page for gcache(8), a useful geom class when
1011 +        working with large raid3 sets.
1012 +
1013 +        Restore previous workaround for Cypress pata storage controller.
1014 +
1015 + 20110929:
1016 +        Sync ath(4) with FreeBSD 7.3.
1017 +
1018 +        The following modules are no longer available, and should be
1019 +        removed from loader.conf:
1020 +        ath_hal ath_rate_amrr ath_rate_onoe ath_rate_sample
1021 +
1022 +        alc(4) would hibernate when a cable was unplugged and often
1023 +        required bring the interface down and up to "wake up" so that
1024 +        a connection could be established.  Disable hibernation.
1025 +
1026 + 20110928:
1027 +        Fix security issues with gzip and compress related to .Z
1028 +        files that are corrupted.
1029 +
1030 +        Fix path validation with unix domain sockets.
1031 +
1032 + 20110917:
1033 +        Remove dependance on mports perl for generating releases as
1034 +        it's in the base system.
1035 +
1036 + 20110914:
1037 +        Import xz 5.0.3 with liblzma 5.0.3
1038 +
1039 + 20110813:
1040 +        synced the sparc64 GENERIC kernel configuration with amd64.
1041 +
1042 + 20110806:
1043 +        sqlite 3.7.7.1 imported
1044 +
1045 +        msearch(1), libmsearch and msearch.import added.  msearch(1) provides
1046 +        a full text search command line tool.  libmsearch can also be used
1047 +        to build a graphical based search in the future. You can enable
1048 +        index building for msearch in periodic.conf or manually run the
1049 +        /usr/libexec/msearch.index tool.  Full text indexes take considerable
1050 +        space in /var.  I'm using approximately 500MB currently.
1051 +
1052 +        Fix a long standing bug with the periodic script to check package
1053 +        versions.  This will be obsolete with mport though.
1054 +
1055 + 20110710:
1056 +        kdb_enter_why added to MidnightBSD to allow the kernel debugger to
1057 +        know why it's in use and thus script can be run.
1058 +
1059 +        Yet another problem with the perl manifest was fixed
1060 +
1061 + 20110709:
1062 +        cpufreq(1) is a new utility to monitor CPU frequency which may change
1063 +        with use of powerd(8) and cpufreq(4).
1064 +
1065 + 20110612:
1066 +        Update mksh to R40
1067 +
1068 +        Catch up ObsoleteFiles.inc to remove Perl 5.10.x.  Good to run when
1069 +        updating current (cd /usr/src && make check-old)
1070 +
1071 + 20110528:
1072 +        Fix CVE-2011-1910 in BIND 9.6.x.  This affects caching resolvers.
1073 +
1074 + 20110526:
1075 +        newfs:
1076 +        Raised the default blocksize for UFS/FFS filesystems from
1077 +        16K to 32K and the default fragment size from 2K to 4K.
1078 +
1079 +        This should slightly imporve performance on "advanced format"
1080 +        hard drives such as the WD EARS drives. Drives of this type
1081 +        have emulation modes that slow down with lower sizes.  Of course
1082 +        the drive must still be aligned properly when using fdisk.
1083 +
1084 + 20110521:
1085 +        mport tool now has a deleteall command.  This can be used to remove
1086 +        all packages from a system.
1087 +
1088 +        A few bugs with the perl 5.14 import have been fixed.
1089 +
1090 + 20110518:
1091 +        Perl 5.14.0
1092 +
1093 + 20110517:
1094 +        Sendmail 8.14.5
1095 +
1096 + 20110314:
1097 +        DRM/DRI code updated to support newer video cards. (FreeBSD 7.1)
1098 +
1099 +        cdevpriv wrappers added
1100 +
1101 +        nss_mdns hack introduced to work around linking problem.
1102 +
1103 +        dnsextd fixed after update to mDNSResponder code.
1104 +
1105 + 20110308:
1106 +        Introduce liblzma & xz 5.0.1 to the base system
1107 +
1108 +        Patch for OpenSSL security issue CVE-2011-0014.
1109 +
1110 +        "OSREVISION 4004"
1111 +
1112 +        nsswitch module for multicast dns (nss_mdns) added.
1113 +
1114 +        tzdata2011c
1115 +
1116 + 20110220:
1117 +        cam(4) syncronized with FreeBSD 7.3.
1118 +
1119 + 20110219:
1120 +        amdtemp(4) updated to support sensors framework.
1121 +
1122 + 20110217:
1123 +        Perl 5.10.1 imported
1124 +
1125 + 20110216:
1126 +        Introduce igb(4) and split Intel Gigabit Ethernet adapters between
1127 +        igb(4) and em(4).  Newer devices use igb(4).  The code has moved
1128 +        to sys/dev/e1000 for both devices in the kernel. igb(4) has
1129 +        been placed in GENERIC on i386 and amd64.
1130 +
1131 +        Update bfe(4) to support newer devices and WOL.
1132 +
1133 + 20110215:
1134 +        age(4) added.
1135 +
1136 + 20110208:
1137 +        BIND 9.6.3 which fixes a bug with DNSSEC records getting added.
1138 +
1139 + 20110206:
1140 +        eeemon(4) added to monitor Asus Eee PC.
1141 +
1142 + 20110205:
1143 +        OpenSSH 5.7p1
1144 +
1145 +        GNU sort 6.9 (coreutils)
1146 +
1147 + 20110203:
1148 +        one true awk 20100523 imported
1149 +
1150 +        sqlite 3.7.5
1151 +
1152 +        OpenSSL 0.9.8q
1153 +
1154 + 20110202:
1155 +        tcsh 6.17.00
1156 +
1157 +        file 5.05
1158 +
1159 + 20110122:
1160 +        Import it(4) and lm(4), with support for Super I/O hardware monitors. This
1161 +        uses the sensors framework ported by Constantine A. Murenin (GSOC2007)
1162 +
1163 + 20110120:
1164 +        BIND 9.6.2-P3
1165 +
1166 +        sudo 1.7.4-p6
1167 +
1168 + 20110115:
1169 +        Add experimental jme(4) for Jmicron ethernet devices.
1170 +
1171 + 20101130:
1172 +        A double free exists in the SSL client ECDH handling code, when
1173 +        processing specially crafted public keys with invalid prime
1174 +        numbers. [CVE-2010-2939]
1175 +
1176 + 20101120:
1177 +        Several portions of the kernel and userland code related to UFS file
1178 +        systems (and UFS2) cannot properly handle inode counts above 2^31 due
1179 +        to use of int types.  Based on a patch from FreeBSD, I've modified
1180 +        our UFS2 implementation to handle unsigned values for inode counts
1181 +        which should allow for file systems greater than 16TB.
1182 +
1183 +        newfs and growfs was also modified.
1184 +
1185 + 20101110:
1186 +        Fix a security issue with pseudofs which could result in running code in kernel
1187 +        context or a kernel panic depending on system configuration.  This affects file
1188 +        systems such as procfs for instance.
1189 +
1190 + 20101021:
1191 +        sysrc is a utility to print and modify name/value pairs in /etc/rc.conf easily.
1192 +        This is similar to functions present in many linux distros. The utility was
1193 +        written by Devin Teske for FreeBSD.
1194 +
1195 + 20100920:
1196 +        bzip2 security patch for integer overflow.
1197 +
1198 + 20100905:
1199 +        MidnightBSD RELENG_0_3 branch created.  Aggressive development continues here
1200 +        for 0.4.
1201 +
1202 + 20100902:
1203 +        Fix a security issue with libutil that allows users to bypass cpu limits in
1204 +        login.conf in some cases.  This combined with OpenSSH for example can allow
1205 +        the user to get more resources than they're allowed.
1206 +
1207 + 20100822:
1208 +        Import Apple's mDNSResponder (mdnsd).
1209 +
1210 + 20100814:
1211 +        libdispatch added to MidnightBSD.  This provides functionality found in
1212 +        Mac OS X's GCD.  We do not have blocks support yet.  As this code is
1213 +        licensed under Apache 2, we create a new MK_APACHE option so that
1214 +        it's not required for all users to run code under a license they
1215 +        may not like.
1216 +
1217 + 20100713:
1218 +        mbuf readonly fix related to sendfile(2) data corruption.
1219 +
1220 + 20100704:
1221 +        brainfuck(1) imported from MirBSD.
1222 +
1223 + 20100505:
1224 +        zlib 1.2.5
1225 +
1226   20100430:
1227          Sudo 1.7.2p6 imported
1228  
# Line 850 | Line 2073 | Contact Warner Losh if you have any questions about yo
2073   this document.
2074  
2075   $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
2076 < $MidnightBSD: src/UPDATING,v 1.87 2010/03/21 20:05:10 laffer1 Exp $
2076 > $MidnightBSD$

Comparing trunk/UPDATING (property cvs2svn:cvs-rev):
Revision 3394 by laffer1, Sat May 1 00:14:17 2010 UTC vs.
Revision 9534 by laffer1, Sun Aug 20 00:04:01 2017 UTC

# Line 1 | Line 0
1 1.88

Comparing trunk/UPDATING (property svn:keywords):
Revision 3394 by laffer1, Sat May 1 00:14:17 2010 UTC vs.
Revision 9534 by laffer1, Sun Aug 20 00:04:01 2017 UTC

# Line 0 | Line 1
1 + MidnightBSD=%H

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines