ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 4636 by laffer1, Fri Feb 10 02:25:38 2012 UTC vs.
Revision 9495 by laffer1, Sun Mar 26 15:20:06 2017 UTC

# Line 1 | Line 1
1 < Updating Information for MidnightBSD users
1 > Updating Information for MidnightBSD users.
2  
3 + 20170326:
4 +        Stable 0.9 created, continue development on 0.10
5 +
6 + 20170305:
7 +        Add hast module to bsnmpd
8 +
9 + 20170302:
10 +        add a callback to the ada(4) driver so that it knows when
11 +        GEOM has released references to it.
12 +
13 + 20170219:
14 +        Add /dev/full device.
15 +
16 +        The lindev device has been removed since /dev/full has been made a
17 +        standard device.
18 +
19 +        Serf 1.3.9
20 +        Subversion 1.8.10
21 +        apr 1.5.2
22 +        apr-util 1.5.4
23 +
24 + 20170129:
25 +        add doas utility from OpenBSD.
26 +
27 + 20161105:
28 +        BIND 9.9.9-p4
29 +
30 +        OpenSSH 7.3p1
31 +
32 + 20161103:
33 +        OpenSSL security patch
34 +
35 +        Due to improper handling of alert packets, OpenSSL would consume an excessive
36 +        amount of CPU time processing undefined alert messages.
37 +
38 + 20161015:
39 +        libarchive 3.2.1
40 +
41 +        xz 5.2.2
42 +
43 + 20161013:
44 +        Sync ZFS code with Illuminos/FreeBSD 9.2. Added support for
45 +        feature flags, pool version 5000. This also includes some
46 +        bug fixes and performance optimizations.
47 +
48 + 20160925:
49 +        Import NetBSD vis(3) and unvis(3) as well as mtree.
50 +
51 +        one-true-awk 20121220
52 +
53 +        inetd now honors kern.ipc.somaxconn value.
54 +
55 +        netmap synced with FreeBSD 9.2
56 +
57 +        linuxolator now has dtrace probes.
58 +
59 +        bsdgrep now correctly handles -m to exclude only one file.
60 +
61 +        UFS file systems can now be resized in read-write mode due to the new
62 +        write suspension feature.
63 +
64 +        Basic support added for Intel Raid Recover Technology.
65 +
66 +        GMIRROR & GRAID3 now mark volumes clean on shutdown earlier to help with ZFS issues.
67 +
68 +        Highpoint hpt27xx now in GENERIC kernel.
69 +
70 + 20160923:
71 +        Security update for OpenSSL
72 +
73 +        A malicious client can send an excessively large OCSP Status Request extension.
74 +        If that client continually requests renegotiation, sending a large OCSP Status
75 +        Request extension each time, then there will be unbounded memory growth on the
76 +        server. [CVE-2016-6304]
77 +
78 +        An overflow can occur in MDC2_Update() either if called directly or through
79 +        the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
80 +        very large amounts of input data after a previous call to EVP_EncryptUpdate()
81 +        with a partial block then a length check can overflow resulting in a heap
82 +        corruption. [CVE-2016-6303]
83 +
84 +        If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
85 +        DoS attack where a malformed ticket will result in an OOB read which will
86 +        ultimately crash. [CVE-2016-6302]
87 +
88 +        The function BN_bn2dec() does not check the return value of BN_div_word().
89 +        This can cause an OOB write if an application uses this function with an
90 +        overly large BIGNUM. This could be a problem if an overly large certificate
91 +        or CRL is printed out from an untrusted source. TLS is not affected because
92 +        record limits will reject an oversized certificate before it is parsed.
93 +        [CVE-2016-2182]
94 +
95 +        The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
96 +        the total length the OID text representation would use and not the amount
97 +        of data written. This will result in OOB reads when large OIDs are presented.
98 +        [CVE-2016-2180]
99 +
100 +        Some calculations of limits in OpenSSL have used undefined pointer arithmetic.
101 +        This could cause problems with some malloc implementations. [CVE-2016-2177]
102 +
103 +        Operations in the DSA signing algorithm should run in constant time in order to
104 +        avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
105 +        a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
106 +
107 +        In a DTLS connection where handshake messages are delivered out-of-order those
108 +        messages that OpenSSL is not yet ready to process will be buffered for later
109 +        use. Under certain circumstances, a flaw in the logic means that those messages
110 +        do not get removed from the buffer even though the handshake has been completed.
111 +        An attacker could force up to approx. 15 messages to remain in the buffer when
112 +        they are no longer required. These messages will be cleared when the DTLS
113 +        connection is closed. The default maximum size for a message is 100k. Therefore
114 +        the attacker could force an additional 1500k to be consumed per connection.
115 +        [CVE-2016-2179]
116 +
117 +        A flaw in the DTLS replay attack protection mechanism means that records that
118 +        arrive for future epochs update the replay protection "window" before the MAC
119 +        for the record has been validated. This could be exploited by an attacker by
120 +        sending a record for the next epoch (which does not have to decrypt or have a
121 +        valid MAC), with a very large sequence number. This means that all subsequent
122 +        legitimate packets are dropped causing a denial of service for a specific
123 +        DTLS connection. [CVE-2016-2181]
124 +
125 +        In OpenSSL 1.0.2 and earlier some missing message length checks can result in
126 +        OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
127 +        DoS risk but this has not been observed in practice on common platforms.
128 +        [CVE-2016-6306]
129 +
130 + 20160918:
131 +        With the addition of auditdistd(8), a new auditdistd user is now
132 +        depended on during installworld.  "mergemaster -p" can be used to add
133 +        the user prior to installworld.
134 +
135 +        The VFS KBI was changed with the merge of several nullfs
136 +        optimizations and fixes.  All filesystem modules must be
137 +        recompiled.
138 +
139 + 20160916:
140 +        The random(4) support for the VIA hardware random number
141 +        generator (`PADLOCK') is no longer enabled unconditionally.
142 +        Add the PADLOCK_RNG option in the custom kernel config if
143 +        needed.  The GENERIC kernels on i386 and amd64 do include the
144 +        option, so the change only affects the custom kernel
145 +        configurations.
146 +
147 +        A new version of ZFS (pool version 5000) has been merged.
148 +        Starting with this version the old system of ZFS pool versioning
149 +        is superseded by "feature flags". This concept enables forward
150 +        compatibility against certain future changes in functionality of ZFS
151 +        pools. The first two read-only compatible "feature flags" for ZFS
152 +        pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
153 +        For more information read the new zpool-features(7) manual page.
154 +        Please refer to the "ZFS notes" section of this file for information
155 +        on upgrading boot ZFS pools.
156 +
157 + 20160906:
158 +        Add support for the MosChip MCS9904 four serial ports
159 +        controller.
160 +
161 +        Add support for walltimestamp in DTrace.
162 +
163 +        Various gdb improvments.
164 +
165 +        ZFS
166 +        Import the zio nop-write improvement from Illumos. To reduce I/O,
167 +        nop-write omits overwriting data if the checksum (cryptographically
168 +        secure) of new data matches the checksum of existing data.
169 +        It also saves space if snapshots are in use.
170 +
171 +        It currently works only on datasets with enabled compression, disabled
172 +        deduplication and sha256 checksums.
173 +
174 +        Add loader(8) tunable to enable/disable nopwrite functionality:
175 +        vfs.zfs.nopwrite_enabled
176 +
177 +        Introduce a new dataset aclmode setting "restricted" to protect ACL's
178 +        being destroyed or corrupted by a drive-by chmod.
179 +
180 +        New loader-only tunables:
181 +        vfs.zfs.sync_pass_deferred_free
182 +        vfs.zfs.sync_pass_dont_compress
183 +        vfs.zfs.sync_pass_rewrite
184 +
185 +        chkgrp(8) add support for q flag
186 +
187 +        Fix problem with the Samsung 840 PRO series SSD detection.
188 +        The device reports support for SATA Asynchronous Notification in its
189 +        IDENTIFY data, but returns error on attempt to enable that feature.
190 +        Make SATA XPT of CAM only report these errors, but not fail the device.
191 +
192 + 20160905:
193 +        Add a resource limit for the total number of kqueues
194 +        available to the user. Kqueue now saves the ucred of the
195 +        allocating thread, to correctly decrement the counter on close.
196 +        Based on FreeBSD SVN 256849
197 +
198 +        Import netcat from OpenBSD 5.2
199 +
200 + 20160904:
201 +        Introduced experimental TCP sysctls starting with
202 +        net.inet.tcp.experimental.initcwnd10
203 +
204 + 20160814:
205 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
206 +        in the release after the fact.
207 +
208 +        tzdata 2016a
209 +
210 + 20160811:
211 +        libdispatch 210
212 +
213 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
214 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
215 +        added WD Red drives.
216 +
217 +        Updated list of pci device vendors.
218 +
219 +        Updated list of usb devices.
220 +
221 + 20160807:
222 +        Implement several changes to libmport to fix some memory corruption issues.
223 +
224 + 20160806:
225 +        sqlite3 3.13.0
226 +
227 + 20160805:
228 +        Merged fixes for libmport that improve error handling when installing packages. Also
229 +        support mkdir -p like behavior for plist entries.
230 +
231 + 20160531:
232 +        Fix four security issues with MidnightBSD.
233 +
234 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
235 +        struct before sending to userland in the linux emulation layer.
236 +
237 +        The compat 43 stat(2) system call exposes kernel stack to userland.
238 +
239 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
240 +        cpio directory traversal and an integer signedness error in the archive
241 +        write zip data routine.
242 +
243 +
244 + 20160528:
245 +        Fixed minor issues with mined(1) and msearch(1).
246 +
247 + 20160526:
248 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
249 +
250 +        Fix libpmc(3) build with clang compiler.
251 +
252 + 20160519:
253 +        Kernel Security updates
254 +
255 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
256 +        local user to overwrite a portion of the kernel memory.
257 +
258 +        Incorrect argument handling in sendmsg(2)
259 +
260 +        Incorrect argument handling in the socket code allows malicious local
261 +        user to overwrite large portion of the kernel memory.
262 +
263 + 20160505:
264 +        OpenSSL security patch
265 +
266 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
267 +        by making sure that always the same bytes are read and compared against
268 +        either the MAC or padding bytes. But it no longer checked that there was
269 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
270 +
271 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
272 +        Base64 encoding of binary data. [CVE-2016-2105]
273 +
274 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
275 +        believed that there can be no overflows in internal code due to this problem.
276 +        [CVE-2016-2106]
277 +
278 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
279 +        a short invalid encoding can casuse allocation of large amounts of memory
280 +        potentially consuming excessive resources or exhausting memory.
281 +        [CVE-2016-2109]
282 +
283 + 20160412:
284 +        0.8 stable branch created. Continue development as 0.9.
285 +
286 +        Fix several issues with wait6 system call addition.
287 +
288 + 20160409:
289 +        libmport now supports two new plist formats:
290 +        @(root,wheel,4775) myfile
291 +        @dir(root,wheel,775) mydir
292 +
293 +        On delete, absoluate paths are now handled properly.
294 +
295 + 20160317:
296 +        OpenSSH doesn't have the luck of the Irish.
297 +
298 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
299 +        run shell commands on the call to xauth.
300 +
301 +        Incorrect argument validation in sysarch(2)
302 +
303 +        A special combination of sysarch(2) arguments, specify a request to
304 +        uninstall a set of descriptors from the LDT.  The start descriptor
305 +        is cleared and the number of descriptors are provided.  Due to invalid
306 +        use of a signed intermediate value in the bounds checking during argument
307 +        validity verification, unbound zero'ing of the process LDT and adjacent
308 +        memory can be initiated from usermode.
309 +
310 +        Patch obtained from FreeBSD.
311 +
312 + 20160229:
313 +        top now displays information on ZFS arc cache.
314 +
315 + 20160228:
316 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
317 +
318 + 20160222:
319 +        Introduce pipe2 to linux emulation layer.
320 +
321 + 20160114:
322 +        OpenSSL
323 +
324 +        The signature verification routines will crash with a NULL pointer dereference
325 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
326 +        mask generation function parameter. [CVE-2015-3194]
327 +
328 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
329 +        memory. [CVE-2015-3195]
330 +
331 +        If PSK identity hints are received by a multi-threaded client then the values
332 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
333 +
334 +        Fix security on bsnmpd configuration file during installation.
335 +
336 +        TCP MD5 signature denial of service
337 +
338 +        A programming error in processing a TCP connection with both TCP_MD5SIG
339 +        and TCP_NOOPT socket options may lead to kernel crash.
340 +
341 +        SCTP
342 +
343 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
344 +        can lead to either a failed kernel assertion or to a NULL pointer
345 +        dereference.  In either case, a kernel panic will follow.
346 +
347 + 20160102:
348 +        Happy New Year
349 +
350 + 20151101:
351 +        Increase kern.ipc.somaxconn default to 256.
352 +
353 + 20151017:
354 +        Add initial statistics api to libmport and a driver to print
355 +        it in mport(1).
356 +
357 + 20151002:
358 +        Revised rpcbind(8) patch to fix issues with NIS
359 +
360 + 20150930:
361 +        In rpcbind(8), netbuf structures are copied directly, which would result in
362 +        two netbuf structures that reference to one shared address buffer.  When one
363 +        of the two netbuf structures is freed, access to the other netbuf structure
364 +        would result in an undefined result that may crash the rpcbind(8) daemon.
365 +
366 + 20150926:
367 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
368 +        to replace @exec and @unexec.  
369 +
370 +        pre exec runs afer pre-install scripts but before actual installation
371 +
372 +        post exec runs after install but before post install scripts and
373 +        pkg message.
374 +
375 +        pre unexec runs before pre uninstall scripts
376 +
377 +        post unexec runs before de-install scripts and after file removal.
378 +
379 + 20150917:
380 +        Fix kqueue write events for files > 2GB
381 +
382 + 20150825:
383 +        kernel:
384 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
385 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
386 +
387 +        openssh:
388 +        A programming error in the privileged monitor process of the sshd(8)
389 +        service may allow the username of an already-authenticated user to be
390 +        overwritten by the unprivileged child process.
391 +
392 +        A use-after-free error in the privileged monitor process of he sshd(8)
393 +        service may be deterministically triggered by the actions of a
394 +        compromised unprivileged child process.
395 +
396 +        A use-after-free error in the session multiplexing code in the sshd(8)
397 +        service may result in unintended termination of the connection.
398 +
399 + 20150818:
400 +        expat security fix
401 +
402 + 20150815:
403 +        libc changes:
404 +        setmode(3) now returns errno consistently on error.
405 +        libc will compile without error using clang
406 +
407 + 20150814:
408 +        wait6 system call added.
409 +
410 +        date(1) now handles non numeric numbers passed to -r
411 +        like GNU coreutils for improved compatibility.
412 +
413 + 20150811:
414 +        ata(4) AMD Hudson2 SATA controller support.
415 +        Intel lynxpoint SATA.
416 +
417 +        Fix some const warnings when building several device drivers
418 +        with llvm/clang.
419 +
420 +        Sync cas(4) with FreeBSD 9-stable.
421 +
422 +        Fix some minor issues with ath(4).
423 +
424 + 20150809:
425 +        xz 5.0.8
426 +
427 + 20150808:
428 +        libmport now logs installation and removal of packages to syslog.
429 +
430 + 20150805:
431 +        routed - fix a potential security issue where traffic from outside
432 +        the network can disrupt routing.
433 +
434 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
435 +        to run.
436 +
437 + 20150802:
438 +        jansson 2.7 library added. (libjansson is a JSON library in C)
439 +
440 + 20150728:
441 +        Heimdal 1.5.2 (kerberos implementation)
442 +
443 +        OpenSSL 1.0.1o
444 +
445 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
446 +
447 +        TCP Resassemly resource exhaustion bug:
448 +        There is a mistake with the introduction of VNET, which converted the
449 +        global limit on the number of segments that could belong to reassembly
450 +        queues into a per-VNET limit.  Because mbufs are allocated from a
451 +        global pool, in the presence of a sufficient number of VNETs, the
452 +        total number of mbufs attached to reassembly queues can grow to the
453 +        total number of mbufs in the system, at which point all network
454 +        traffic would cease.
455 +        Obtained from: FreeBSD 8
456 +
457 +        OpenSSH
458 +
459 +        Fix two security vulnerabilities:
460 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
461 +        offers a certificate. [CVE-2014-2653]
462 +
463 +        OpenSSH servers which are configured to allow password authentication
464 +        using PAM (default) would allow many password attempts. A bug allows
465 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
466 +
467 +
468 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
469 +
470 + 20150726:
471 +        BSD Sort updated
472 +
473 +        sqlite 3.8.10.2
474 +
475 + 20150725:
476 +        Import reallocarray from OpenBSD's libc.  
477 +
478 +        The reallocarray() function is similar to realloc() except it operates on
479 +        nmemb members of size size and checks for integer overflow in the
480 +        calculation nmemb * size.
481 +
482 + 20150722:
483 +        Fix a bug where TCP connections transitioning to LAST_ACK
484 +        state can get stuck. This can result in a denial of service.
485 +
486 + 20150715:
487 +        libmport now supports @shell and @sample in plists. This means that
488 +        a shell port can automatically add an entry to /etc/shells and remove
489 +        it upon uninstallation. For sample files, a copy is made without the
490 +        .sample extension if one does not exist and it is removed automatically
491 +        only if the md5 hash of the two files is the same.
492 +
493 + 20150709:
494 +        flex 2.5.39
495 +
496 + 20150702:
497 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
498 +        with zfs set compression=lz4 pool/path.
499 +
500 +        Verify it's working with
501 +        zfs get compressratio pool/path
502 +        du -h -s *
503 +
504 +        Note you must write new data when turning on compression to see
505 +        changes. Existing files are not compressed.
506 +
507 +        Note: While we used the same basic implementation of lz4 that
508 +        FreeBSD and OpenZFS uses, we did not yet implement features support
509 +        and the zfs version still reports 28. This may come in a future update
510 +        to ZFS.
511 +
512 + 20150621:
513 +        libmport now automatically stops services when deleting packages.
514 +
515 +        The package must have installed an rc.d script in /usr/local/etc
516 +        for this to work. This is equivalent to running service <name> onestop
517 +
518 + 20150618:
519 +        Sendmail
520 +
521 +        With the recent changes to OpenSSL to block 512 bit certificates,
522 +        sendmail can't connect with TLS to some servers.
523 +
524 +        Increase the default size to 1024 bit for client connections to
525 +        match the server configuration.
526 +
527 +        ZFS
528 +
529 +        Added ZFS TRIM support which is enabled by default. To disable
530 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
531 +
532 +        Creating new ZFS pools and adding new devices to existing pools
533 +        first performs a full device level TRIM which can take a significant
534 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
535 +        to disable this behaviour.
536 +
537 +        ZFS TRIM requires the underlying device support BIO_DELETE which
538 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
539 +        via CAM, which are typically supported by SSD's.
540 +
541 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
542 +        under kstat.zfs.misc.zio_trim.
543 +
544 +        rc.d
545 +
546 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
547 +        implies everything is mounted and ready to go.
548 +
549 +        Changed how ip6addressctl maps IPv6 on startup.
550 +
551 + 20150613:
552 +        tzdata 2015d
553 +
554 + 20150612:
555 +        OpenSSL 0.9.8zg
556 +
557 + 20150419:
558 +        MidnightBSD 0.6 stable branch created. Continue 0.7
559 +        development.
560 +
561 + 20150418:
562 +        sqlite 3.8.9
563 +
564 + 20150407:
565 +        Fix two security vulnerabilities:
566 +
567 +        The previous fix for IGMP had an overflow issue. This has been corrected.
568 +
569 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
570 +        suggested Current Hop Limit value of a link, which will replace
571 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
572 +        system.
573 +
574 + 20150319:
575 +        OpenSSL 0.9.8.zf
576 +
577 +        mksh R50e
578 +
579 +        Apple mDNSResponder 561.1.1
580 +
581 + 20150306:
582 +        Upgrade OpenSSL to 0.9.8ze
583 +
584 + 20150225:
585 +        Fix two security vulnerabilities.
586 +
587 +        1. BIND servers which are configured to perform DNSSEC validation and which
588 +        are using managed keys (which occurs implicitly when using
589 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
590 +        unpredictable behavior due to the use of an improperly initialized
591 +        variable.
592 +
593 +        CVE-2015-1349
594 +
595 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
596 +        in a buffer which is too small for the requested operation.
597 +
598 +        This can result in a DOS attack.
599 +
600 + 20141211:
601 +        Fix a security issue with file and libmagic that can allow
602 +        an attacker to create a denial of service attack on any
603 +        program that uses libmagic.
604 +
605 + 20141109:
606 +        Fix building perl during buildworld when the GDBM port is installed.
607 +
608 + 20141106:
609 +        tzdata 2014i
610 +
611 + 20141102:
612 +        serf 1.3.8
613 +
614 + 20141031:
615 +        tnftp 20141031 fixes a security vulnerability with tnftp,
616 +        CVE-2014-8517.
617 +
618 + 20141028:
619 +        OpenSSL 0.9.8zc
620 +
621 + 20141021:
622 +        Fix several security vulnerabilities in routed, rtsold,
623 +        and namei with respect to Capsicum sandboxes looking up
624 +        nonexistent path names and leaking memory.
625 +
626 +        The input path in routed(8) will accept queries from any source and
627 +        attempt to answer them.  However, the output path assumes that the
628 +        destination address for the response is on a directly connected
629 +        network.
630 +
631 +        Due to a missing length check in the code that handles DNS parameters,
632 +        a malformed router advertisement message can result in a stack buffer
633 +        overflow in rtsold(8).
634 +
635 + 20141011:
636 +        mksh R50d - fix field splitting regression and null
637 +        pointer dereference
638 +
639 +        xz 5.0.7
640 +
641 +        OpenSSH 6.6p1
642 +
643 + 20141004:
644 +        mksh R50c - security update for environment var bug with
645 +        foo vs foo+    
646 +
647 + 20141002:
648 +        sqlite 3.8.6
649 +
650 +        sudo 1.7.8 - some issues with the current version, but we're slowly
651 +        getting up to date.
652 +
653 + 20141001:
654 +        mksh R50b
655 +
656 +        libmport now supports plist commands @dir, @owner, @group, @mode.
657 +
658 +        sudo 1.7.6p2
659 +
660 + 20140916:
661 +        Fix a security issue with TCP SYN.
662 +
663 +        When a segment with the SYN flag for an already existing connection arrives,
664 +        the TCP stack tears down the connection, bypassing a check that the
665 +        sequence number in the segment is in the expected window.
666 +
667 + 20140909:
668 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
669 +        with some programs including Dovecot.
670 +
671 +        OpenSSL security patch:
672 +
673 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
674 +        to consume large amounts of memory. [CVE-2014-3506]
675 +
676 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
677 +        memory. [CVE-2014-3507]
678 +
679 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
680 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
681 +        the stack. [CVE-2014-3508]
682 +
683 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
684 +        a denial of service attack. [CVE-2014-3510]
685 +
686 + 20140902:
687 +        We're now 0.6-CURRENT
688 +
689 +        Update USB quirks to support K70 Corsair keyboard, and several
690 +        other devices.
691 +
692 + 20140827:
693 +        Perl 5.18.2
694 +
695 + 20140728:
696 +        Jails now run shutdown scripts.
697 +
698 + 20140710:
699 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
700 +        before sharing with userland.
701 +
702 + 20140701:
703 +        MKSH R50
704 +
705 + 20140630:
706 +        File 5.19
707 +
708 + 20140605:
709 +        Fix four security issues with OpenSSL
710 +
711 + 20140604:
712 +        Sendmail failed to properly set close-on-exec for open file descriptors.
713 +
714 +        ktrace page fault kernel trace entries were set to an incorrect size which resulted
715 +        in a leak of information.
716 +
717 + 20140430:
718 +        Fix a TCP reassembly bug that could result in a DOS attack
719 +        of the system. It may be possible to obtain portions
720 +        of kernel memory as well.
721 +
722 + 20140411:
723 +        Update zlib to 1.2.7
724 +
725 + 20140122:
726 +        Support for username with length 32. Previous limit was 16
727 +
728 + 20140114:
729 +        Fix two security vulnerabilities.
730 +
731 +        bsnmpd contains a stack overflow when sent certain queries.
732 +
733 +        bind 9.8 when using NSEC3-signed zones zones, will crash with special
734 +        crafted packets.
735 +
736 + 20131228:
737 +        Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
738 +
739 +        Updated em(4), igb(4) and ixgbe(4)
740 +
741 +        MidnightBSD now works with Z87 Intel chipsets.
742 +
743 + 20131207:
744 +        Remove sparc64 architecture. It hasn't been working for awhile
745 +        and it's not useful for desktops anymore.
746 +
747 + 20131205:
748 +        OpenSSH 6.4p1
749 +
750 + 20131203:
751 +        Perl 5.18.1 imported.
752 +
753 +        Update less to v458
754 +
755 + 20131130:
756 +        Remove named from base. We still include the client utilities for
757 +        now until replacements can be found.
758 +
759 + 20131004:
760 +        rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
761 +
762 + 20130917:
763 +        Support for 65,536 routing tables was added.  A new fib specific
764 +        field has been added to mbuf.  This is an increase from 16.
765 +
766 + 20130910:
767 +        Security updates: (kern.osreldate 5001)
768 +
769 +        nullfs(5)
770 +
771 +        The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
772 +        check whether the source and target of the link are both in the same
773 +        nullfs instance.  It is therefore possible to create a hardlink from a
774 +        location in one nullfs instance to a file in another, as long as the
775 +        underlying (source) filesystem is the same.
776 +
777 +        ifioctl
778 +
779 +        As is commonly the case, the IPv6 and ATM network layer ioctl request
780 +        handlers are written in such a way that an unrecognized request is
781 +        passed on unmodified to the link layer, which will either handle it or
782 +        return an error code.
783 +
784 +        Network interface drivers, however, assume that the SIOCSIFADDR,
785 +        SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
786 +        handled at the network layer, and therefore do not perform input
787 +        validation or verify the caller's credentials.  Typical link-layer
788 +        actions for these requests may include marking the interface as "up"
789 +        and resetting the underlying hardware.
790 +
791 + 20130824:
792 +        Fix a bug in sendmail 8.14.7 that interferes with how it
793 +        handles AAAA records interoperating with Microsoft DNS servers.
794 +        FreeBSD has already reported this to Sendmail and a fix
795 +        will be included in the next release.
796 +
797 +        Subversion 1.8.1 is now in the base system as a static
798 +        binary.  It has limited functionality, but can be used to
799 +        checkout/commit code.  It is named svnlite.
800 +
801 + 20130822:
802 +        Fix two security vulnerabilities.
803 +
804 +        Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
805 +        This could be exploited to read memory by a user process.
806 +
807 +        When initializing the SCTP state cookie being sent in INIT-ACK chunks,
808 +        a buffer allocated from the kernel stack is not completely initialized.
809 +
810 +        Import xz 5.0.4
811 +
812 +        Import sqlite 3.7.17
813 +
814 +        Import BIND 9.8.5-P2
815 +
816 + 20130814:
817 +        mksh R48 imported.
818 +
819 +        Sendmail 8.14.7 imported.
820 +
821 + 20130717:
822 +        libmport bug was fixed causing hash verification to fail.
823 +
824 +        virtio(4) imported from FreeBSD 9-stable. SCSI support not
825 +        included.
826 +
827 + 20130612:
828 +        RELENG_0_4 created for 0.4. Development continues on 0.5.
829 +
830 + 20130402:
831 +        Update BIND and OpenSSL to resolve security advisories.
832 +
833 + 20130305:
834 +        MKSH R44 imported.
835 +
836 + 20130213:
837 +        MKSH R42b imported
838 +
839 + 20130211:
840 +        MKSH R42 imported
841 +
842 + 20130125:
843 +        MKSH R41 imported
844 +
845 + 20130122:
846 +        OpenSSH 5.8p2 imported
847 +
848 +        SQLite 3.7.15.2 imported
849 +
850 +        Fixed a longstanding bug in libmport extrating new index files.
851 +
852 + 20120710:
853 +        BSD licensed sort imported from FreeBSD-CURRENT
854 +
855 +        For now, GNU sort is installed as gnusort, but it will
856 +        go away in time.
857 +
858 + 20120708:
859 +        tcsh 6.18.01 imported.
860 +
861 +        NetBSD's iconv imported.
862 +
863 +        libc gains strnlen(3), memrchr(3), stpncpy(3).
864 +
865 + 20120612:
866 +        BIND security update related to CVE-2012-1667.
867 +
868 +        Zero length resource records can cause BIND to crash resulting
869 +        in a DOS attack or information disclosure.
870 +
871 + 20120407:
872 +        mksh R40f (fixes regression)
873 +
874 + 20120328:
875 +        mksh R40e
876 +
877 +        Perl 5.14.2
878 +
879 + 20120229:
880 +        cpucontrol(8) and cpuctl(4) added from FreeBSD 7-stable.
881 +
882   20120209:
883          mDNSResponder 333.10 imported
884  
# Line 1186 | Line 2065 | Contact Warner Losh if you have any questions about yo
2065   this document.
2066  
2067   $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
2068 < $MidnightBSD: src/UPDATING,v 1.155 2011/12/28 00:46:31 laffer1 Exp $
2068 > $MidnightBSD$

Comparing trunk/UPDATING (property cvs2svn:cvs-rev):
Revision 4636 by laffer1, Fri Feb 10 02:25:38 2012 UTC vs.
Revision 9495 by laffer1, Sun Mar 26 15:20:06 2017 UTC

# Line 1 | Line 0
1 1.156

Comparing trunk/UPDATING (property svn:keywords):
Revision 4636 by laffer1, Fri Feb 10 02:25:38 2012 UTC vs.
Revision 9495 by laffer1, Sun Mar 26 15:20:06 2017 UTC

# Line 0 | Line 1
1 + MidnightBSD=%H

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines