ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 4277 by laffer1, Sat Oct 22 14:29:38 2011 UTC vs.
Revision 7094 by laffer1, Wed Jul 15 12:11:04 2015 UTC

# Line 1 | Line 1
1 < Updating Information for MidnightBSD users
1 > Updating Information for MidnightBSD users.
2  
3 + 20150715:
4 +        libmport now supports @shell and @sample in plists. This means that
5 +        a shell port can automatically add an entry to /etc/shells and remove
6 +        it upon uninstallation. For sample files, a copy is made without the
7 +        .sample extension if one does not exist and it is removed automatically
8 +        only if the md5 hash of the two files is the same.
9 +
10 + 20150709:
11 +        flex 2.5.39
12 +
13 + 20150702:
14 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
15 +        with zfs set compression=lz4 pool/path.
16 +
17 +        Verify it's working with
18 +        zfs get compressratio pool/path
19 +        du -h -s *
20 +
21 +        Note you must write new data when turning on compression to see
22 +        changes. Existing files are not compressed.
23 +
24 +        Note: While we used the same basic implementation of lz4 that
25 +        FreeBSD and OpenZFS uses, we did not yet implement features support
26 +        and the zfs version still reports 28. This may come in a future update
27 +        to ZFS.
28 +
29 + 20150621:
30 +        libmport now automatically stops services when deleting packages.
31 +
32 +        The package must have installed an rc.d script in /usr/local/etc
33 +        for this to work. This is equivalent to running service <name> onestop
34 +
35 + 20150618:
36 +        Sendmail
37 +
38 +        With the recent changes to OpenSSL to block 512 bit certificates,
39 +        sendmail can't connect with TLS to some servers.
40 +
41 +        Increase the default size to 1024 bit for client connections to
42 +        match the server configuration.
43 +
44 +        ZFS
45 +
46 +        Added ZFS TRIM support which is enabled by default. To disable
47 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
48 +
49 +        Creating new ZFS pools and adding new devices to existing pools
50 +        first performs a full device level TRIM which can take a significant
51 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
52 +        to disable this behaviour.
53 +
54 +        ZFS TRIM requires the underlying device support BIO_DELETE which
55 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
56 +        via CAM, which are typically supported by SSD's.
57 +
58 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
59 +        under kstat.zfs.misc.zio_trim.
60 +
61 +        rc.d
62 +
63 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
64 +        implies everything is mounted and ready to go.
65 +
66 +        Changed how ip6addressctl maps IPv6 on startup.
67 +
68 + 20150613:
69 +        tzdata 2015d
70 +
71 + 20150612:
72 +        OpenSSL 0.9.8zg
73 +
74 + 20150419:
75 +        MidnightBSD 0.6 stable branch created. Continue 0.7
76 +        development.
77 +
78 + 20150418:
79 +        sqlite 3.8.9
80 +
81 + 20150407:
82 +        Fix two security vulnerabilities:
83 +
84 +        The previous fix for IGMP had an overflow issue. This has been corrected.
85 +
86 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
87 +        suggested Current Hop Limit value of a link, which will replace
88 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
89 +        system.
90 +
91 + 20150319:
92 +        OpenSSL 0.9.8.zf
93 +
94 +        mksh R50e
95 +
96 +        Apple mDNSResponder 561.1.1
97 +
98 + 20150306:
99 +        Upgrade OpenSSL to 0.9.8ze
100 +
101 + 20150225:
102 +        Fix two security vulnerabilities.
103 +
104 +        1. BIND servers which are configured to perform DNSSEC validation and which
105 +        are using managed keys (which occurs implicitly when using
106 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
107 +        unpredictable behavior due to the use of an improperly initialized
108 +        variable.
109 +
110 +        CVE-2015-1349
111 +
112 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
113 +        in a buffer which is too small for the requested operation.
114 +
115 +        This can result in a DOS attack.
116 +
117 + 20141211:
118 +        Fix a security issue with file and libmagic that can allow
119 +        an attacker to create a denial of service attack on any
120 +        program that uses libmagic.
121 +
122 + 20141109:
123 +        Fix building perl during buildworld when the GDBM port is installed.
124 +
125 + 20141106:
126 +        tzdata 2014i
127 +
128 + 20141102:
129 +        serf 1.3.8
130 +
131 + 20141031:
132 +        tnftp 20141031 fixes a security vulnerability with tnftp,
133 +        CVE-2014-8517.
134 +
135 + 20141028:
136 +        OpenSSL 0.9.8zc
137 +
138 + 20141021:
139 +        Fix several security vulnerabilities in routed, rtsold,
140 +        and namei with respect to Capsicum sandboxes looking up
141 +        nonexistent path names and leaking memory.
142 +
143 +        The input path in routed(8) will accept queries from any source and
144 +        attempt to answer them.  However, the output path assumes that the
145 +        destination address for the response is on a directly connected
146 +        network.
147 +
148 +        Due to a missing length check in the code that handles DNS parameters,
149 +        a malformed router advertisement message can result in a stack buffer
150 +        overflow in rtsold(8).
151 +
152 + 20141011:
153 +        mksh R50d - fix field splitting regression and null
154 +        pointer dereference
155 +
156 +        xz 5.0.7
157 +
158 +        OpenSSH 6.6p1
159 +
160 + 20141004:
161 +        mksh R50c - security update for environment var bug with
162 +        foo vs foo+    
163 +
164 + 20141002:
165 +        sqlite 3.8.6
166 +
167 +        sudo 1.7.8 - some issues with the current version, but we're slowly
168 +        getting up to date.
169 +
170 + 20141001:
171 +        mksh R50b
172 +
173 +        libmport now supports plist commands @dir, @owner, @group, @mode.
174 +
175 +        sudo 1.7.6p2
176 +
177 + 20140916:
178 +        Fix a security issue with TCP SYN.
179 +
180 +        When a segment with the SYN flag for an already existing connection arrives,
181 +        the TCP stack tears down the connection, bypassing a check that the
182 +        sequence number in the segment is in the expected window.
183 +
184 + 20140909:
185 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
186 +        with some programs including Dovecot.
187 +
188 +        OpenSSL security patch:
189 +
190 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
191 +        to consume large amounts of memory. [CVE-2014-3506]
192 +
193 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
194 +        memory. [CVE-2014-3507]
195 +
196 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
197 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
198 +        the stack. [CVE-2014-3508]
199 +
200 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
201 +        a denial of service attack. [CVE-2014-3510]
202 +
203 + 20140902:
204 +        We're now 0.6-CURRENT
205 +
206 +        Update USB quirks to support K70 Corsair keyboard, and several
207 +        other devices.
208 +
209 + 20140827:
210 +        Perl 5.18.2
211 +
212 + 20140728:
213 +        Jails now run shutdown scripts.
214 +
215 + 20140710:
216 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
217 +        before sharing with userland.
218 +
219 + 20140701:
220 +        MKSH R50
221 +
222 + 20140630:
223 +        File 5.19
224 +
225 + 20140605:
226 +        Fix four security issues with OpenSSL
227 +
228 + 20140604:
229 +        Sendmail failed to properly set close-on-exec for open file descriptors.
230 +
231 +        ktrace page fault kernel trace entries were set to an incorrect size which resulted
232 +        in a leak of information.
233 +
234 + 20140430:
235 +        Fix a TCP reassembly bug that could result in a DOS attack
236 +        of the system. It may be possible to obtain portions
237 +        of kernel memory as well.
238 +
239 + 20140411:
240 +        Update zlib to 1.2.7
241 +
242 + 20140122:
243 +        Support for username with length 32. Previous limit was 16
244 +
245 + 20140114:
246 +        Fix two security vulnerabilities.
247 +
248 +        bsnmpd contains a stack overflow when sent certain queries.
249 +
250 +        bind 9.8 when using NSEC3-signed zones zones, will crash with special
251 +        crafted packets.
252 +
253 + 20131228:
254 +        Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
255 +
256 +        Updated em(4), igb(4) and ixgbe(4)
257 +
258 +        MidnightBSD now works with Z87 Intel chipsets.
259 +
260 + 20131207:
261 +        Remove sparc64 architecture. It hasn't been working for awhile
262 +        and it's not useful for desktops anymore.
263 +
264 + 20131205:
265 +        OpenSSH 6.4p1
266 +
267 + 20131203:
268 +        Perl 5.18.1 imported.
269 +
270 +        Update less to v458
271 +
272 + 20131130:
273 +        Remove named from base. We still include the client utilities for
274 +        now until replacements can be found.
275 +
276 + 20131004:
277 +        rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
278 +
279 + 20130917:
280 +        Support for 65,536 routing tables was added.  A new fib specific
281 +        field has been added to mbuf.  This is an increase from 16.
282 +
283 + 20130910:
284 +        Security updates: (kern.osreldate 5001)
285 +
286 +        nullfs(5)
287 +
288 +        The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
289 +        check whether the source and target of the link are both in the same
290 +        nullfs instance.  It is therefore possible to create a hardlink from a
291 +        location in one nullfs instance to a file in another, as long as the
292 +        underlying (source) filesystem is the same.
293 +
294 +        ifioctl
295 +
296 +        As is commonly the case, the IPv6 and ATM network layer ioctl request
297 +        handlers are written in such a way that an unrecognized request is
298 +        passed on unmodified to the link layer, which will either handle it or
299 +        return an error code.
300 +
301 +        Network interface drivers, however, assume that the SIOCSIFADDR,
302 +        SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
303 +        handled at the network layer, and therefore do not perform input
304 +        validation or verify the caller's credentials.  Typical link-layer
305 +        actions for these requests may include marking the interface as "up"
306 +        and resetting the underlying hardware.
307 +
308 + 20130824:
309 +        Fix a bug in sendmail 8.14.7 that interferes with how it
310 +        handles AAAA records interoperating with Microsoft DNS servers.
311 +        FreeBSD has already reported this to Sendmail and a fix
312 +        will be included in the next release.
313 +
314 +        Subversion 1.8.1 is now in the base system as a static
315 +        binary.  It has limited functionality, but can be used to
316 +        checkout/commit code.  It is named svnlite.
317 +
318 + 20130822:
319 +        Fix two security vulnerabilities.
320 +
321 +        Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
322 +        This could be exploited to read memory by a user process.
323 +
324 +        When initializing the SCTP state cookie being sent in INIT-ACK chunks,
325 +        a buffer allocated from the kernel stack is not completely initialized.
326 +
327 +        Import xz 5.0.4
328 +
329 +        Import sqlite 3.7.17
330 +
331 +        Import BIND 9.8.5-P2
332 +
333 + 20130814:
334 +        mksh R48 imported.
335 +
336 +        Sendmail 8.14.7 imported.
337 +
338 + 20130717:
339 +        libmport bug was fixed causing hash verification to fail.
340 +
341 +        virtio(4) imported from FreeBSD 9-stable. SCSI support not
342 +        included.
343 +
344 + 20130612:
345 +        RELENG_0_4 created for 0.4. Development continues on 0.5.
346 +
347 + 20130402:
348 +        Update BIND and OpenSSL to resolve security advisories.
349 +
350 + 20130305:
351 +        MKSH R44 imported.
352 +
353 + 20130213:
354 +        MKSH R42b imported
355 +
356 + 20130211:
357 +        MKSH R42 imported
358 +
359 + 20130125:
360 +        MKSH R41 imported
361 +
362 + 20130122:
363 +        OpenSSH 5.8p2 imported
364 +
365 +        SQLite 3.7.15.2 imported
366 +
367 +        Fixed a longstanding bug in libmport extrating new index files.
368 +
369 + 20120710:
370 +        BSD licensed sort imported from FreeBSD-CURRENT
371 +
372 +        For now, GNU sort is installed as gnusort, but it will
373 +        go away in time.
374 +
375 + 20120708:
376 +        tcsh 6.18.01 imported.
377 +
378 +        NetBSD's iconv imported.
379 +
380 +        libc gains strnlen(3), memrchr(3), stpncpy(3).
381 +
382 + 20120612:
383 +        BIND security update related to CVE-2012-1667.
384 +
385 +        Zero length resource records can cause BIND to crash resulting
386 +        in a DOS attack or information disclosure.
387 +
388 + 20120407:
389 +        mksh R40f (fixes regression)
390 +
391 + 20120328:
392 +        mksh R40e
393 +
394 +        Perl 5.14.2
395 +
396 + 20120229:
397 +        cpucontrol(8) and cpuctl(4) added from FreeBSD 7-stable.
398 +
399 + 20120209:
400 +        mDNSResponder 333.10 imported
401 +
402 + 20111227:
403 +        import raid5 module for GEOM, graid5(8)
404 +
405 +        This is experimental and known to use a lot of kernel
406 +        memory.
407 +
408 + 20111223:
409 +        telnetd: fix a root exploit from a fixed buffer that was not checked
410 +
411 +        pam: don't allow escape from policy path.  Exploitable in KDE, etc.
412 +
413 +        Fix pam_ssh module:
414 +
415 +        If the pam_ssh module is enabled, attackers may be able to gain access
416 +        to user accounts which have unencrypted SSH private keys.
417 +
418 +        This has to due with the way that openssl works.  It ignores unencrpted data.
419 +
420 +        Fix security issue with chroot and ftpd.
421 +
422 +        nsdispatch(3) doesn't know it's working in a chroot and some
423 +        operations can cause files to get reloaded causing a security
424 +        hole in things like ftpd.
425 +
426 + 20111217:
427 +        libdialog/dialog upgraded to an lgpl version. As it's not
428 +        backwardly compatable, include the old libdialog as libodialog
429 +
430 + 20111212:
431 +        mksh r40d imported
432 +
433 + 20111210:
434 +        re(4) and rl(4) updated to support new chips.
435 +
436 +        GEOM synced with FreeBSD 7-stable.
437 +
438 +        MidnightBSD GPT partition types created in sys/gpt.h and
439 +        setup in boot loader and GEOM.
440 +
441 +        amdsbwd(4) (amd watchdog for south bridge) updated to support
442 +        8xx series chipset.
443 +
444 + 20111207:
445 +        import bsd grep from FreeBSD/OpenBSD.
446 +
447 +        MK_BSD_GREP controls which grep is installed
448 +        as grep with the other as bsdgrep or gnugrep.
449 +
450 + 20111122:
451 +        mksh vR40c imported.
452 +
453 + 20111117:
454 +        BIND 9.6 ESV R5 P1
455 +
456 + 20111107:
457 +        tzdata 2011n
458 +
459 + 20111026:
460 +        mDNSResponder v320
461 +
462 +        BIND 9.6 ESV R5
463 +
464   20111022:
465          cflow 0.0.6 imported
466  
# Line 1121 | Line 1582 | Contact Warner Losh if you have any questions about yo
1582   this document.
1583  
1584   $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
1585 < $MidnightBSD: src/UPDATING,v 1.141 2011/10/20 14:33:13 laffer1 Exp $
1585 > $MidnightBSD$

Comparing trunk/UPDATING (property cvs2svn:cvs-rev):
Revision 4277 by laffer1, Sat Oct 22 14:29:38 2011 UTC vs.
Revision 7094 by laffer1, Wed Jul 15 12:11:04 2015 UTC

# Line 1 | Line 0
1 1.142

Comparing trunk/UPDATING (property svn:keywords):
Revision 4277 by laffer1, Sat Oct 22 14:29:38 2011 UTC vs.
Revision 7094 by laffer1, Wed Jul 15 12:11:04 2015 UTC

# Line 0 | Line 1
1 + MidnightBSD=%H

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines