ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 305 by laffer1, Sat Oct 28 06:15:57 2006 UTC vs.
Revision 9569 by laffer1, Tue Sep 19 01:26:26 2017 UTC

# Line 1 | Line 1
1 < Updating Information for MidnightBSD users
1 > Updating Information for MidnightBSD users.
2  
3 < Items affecting the mports and packages system can be found in
4 < /usr/mports/UPDATING.
3 > 20170918:
4 >        Introduce nvme(4) and nvd(4) from FreeBSD.
5  
6 +        Fix build of boot code and rescue.
7 +
8 + 20170819:
9 +        Heimdal KDC-REP service name validation vulerability patched.
10 +
11 +        Introduce a partial fix for AMD Ryzen issues. On Ryzen, move
12 +        the lower shared page by one.
13 +
14 + 20170326:
15 +        sudo removed from base. Use doas(1) or install sudo from mports
16 +
17 +        Stable 0.9 created, continue development on 0.10
18 +
19 + 20170305:
20 +        Add hast module to bsnmpd
21 +
22 + 20170302:
23 +        add a callback to the ada(4) driver so that it knows when
24 +        GEOM has released references to it.
25 +
26 + 20170219:
27 +        Add /dev/full device.
28 +
29 +        The lindev device has been removed since /dev/full has been made a
30 +        standard device.
31 +
32 +        Serf 1.3.9
33 +        Subversion 1.8.10
34 +        apr 1.5.2
35 +        apr-util 1.5.4
36 +
37 + 20170129:
38 +        add doas utility from OpenBSD.
39 +
40 + 20161105:
41 +        BIND 9.9.9-p4
42 +
43 +        OpenSSH 7.3p1
44 +
45 + 20161103:
46 +        OpenSSL security patch
47 +
48 +        Due to improper handling of alert packets, OpenSSL would consume an excessive
49 +        amount of CPU time processing undefined alert messages.
50 +
51 + 20161015:
52 +        libarchive 3.2.1
53 +
54 +        xz 5.2.2
55 +
56 + 20161013:
57 +        Sync ZFS code with Illuminos/FreeBSD 9.2. Added support for
58 +        feature flags, pool version 5000. This also includes some
59 +        bug fixes and performance optimizations.
60 +
61 + 20160925:
62 +        Import NetBSD vis(3) and unvis(3) as well as mtree.
63 +
64 +        one-true-awk 20121220
65 +
66 +        inetd now honors kern.ipc.somaxconn value.
67 +
68 +        netmap synced with FreeBSD 9.2
69 +
70 +        linuxolator now has dtrace probes.
71 +
72 +        bsdgrep now correctly handles -m to exclude only one file.
73 +
74 +        UFS file systems can now be resized in read-write mode due to the new
75 +        write suspension feature.
76 +
77 +        Basic support added for Intel Raid Recover Technology.
78 +
79 +        GMIRROR & GRAID3 now mark volumes clean on shutdown earlier to help with ZFS issues.
80 +
81 +        Highpoint hpt27xx now in GENERIC kernel.
82 +
83 + 20160923:
84 +        Security update for OpenSSL
85 +
86 +        A malicious client can send an excessively large OCSP Status Request extension.
87 +        If that client continually requests renegotiation, sending a large OCSP Status
88 +        Request extension each time, then there will be unbounded memory growth on the
89 +        server. [CVE-2016-6304]
90 +
91 +        An overflow can occur in MDC2_Update() either if called directly or through
92 +        the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
93 +        very large amounts of input data after a previous call to EVP_EncryptUpdate()
94 +        with a partial block then a length check can overflow resulting in a heap
95 +        corruption. [CVE-2016-6303]
96 +
97 +        If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
98 +        DoS attack where a malformed ticket will result in an OOB read which will
99 +        ultimately crash. [CVE-2016-6302]
100 +
101 +        The function BN_bn2dec() does not check the return value of BN_div_word().
102 +        This can cause an OOB write if an application uses this function with an
103 +        overly large BIGNUM. This could be a problem if an overly large certificate
104 +        or CRL is printed out from an untrusted source. TLS is not affected because
105 +        record limits will reject an oversized certificate before it is parsed.
106 +        [CVE-2016-2182]
107 +
108 +        The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
109 +        the total length the OID text representation would use and not the amount
110 +        of data written. This will result in OOB reads when large OIDs are presented.
111 +        [CVE-2016-2180]
112 +
113 +        Some calculations of limits in OpenSSL have used undefined pointer arithmetic.
114 +        This could cause problems with some malloc implementations. [CVE-2016-2177]
115 +
116 +        Operations in the DSA signing algorithm should run in constant time in order to
117 +        avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
118 +        a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
119 +
120 +        In a DTLS connection where handshake messages are delivered out-of-order those
121 +        messages that OpenSSL is not yet ready to process will be buffered for later
122 +        use. Under certain circumstances, a flaw in the logic means that those messages
123 +        do not get removed from the buffer even though the handshake has been completed.
124 +        An attacker could force up to approx. 15 messages to remain in the buffer when
125 +        they are no longer required. These messages will be cleared when the DTLS
126 +        connection is closed. The default maximum size for a message is 100k. Therefore
127 +        the attacker could force an additional 1500k to be consumed per connection.
128 +        [CVE-2016-2179]
129 +
130 +        A flaw in the DTLS replay attack protection mechanism means that records that
131 +        arrive for future epochs update the replay protection "window" before the MAC
132 +        for the record has been validated. This could be exploited by an attacker by
133 +        sending a record for the next epoch (which does not have to decrypt or have a
134 +        valid MAC), with a very large sequence number. This means that all subsequent
135 +        legitimate packets are dropped causing a denial of service for a specific
136 +        DTLS connection. [CVE-2016-2181]
137 +
138 +        In OpenSSL 1.0.2 and earlier some missing message length checks can result in
139 +        OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
140 +        DoS risk but this has not been observed in practice on common platforms.
141 +        [CVE-2016-6306]
142 +
143 + 20160918:
144 +        With the addition of auditdistd(8), a new auditdistd user is now
145 +        depended on during installworld.  "mergemaster -p" can be used to add
146 +        the user prior to installworld.
147 +
148 +        The VFS KBI was changed with the merge of several nullfs
149 +        optimizations and fixes.  All filesystem modules must be
150 +        recompiled.
151 +
152 + 20160916:
153 +        The random(4) support for the VIA hardware random number
154 +        generator (`PADLOCK') is no longer enabled unconditionally.
155 +        Add the PADLOCK_RNG option in the custom kernel config if
156 +        needed.  The GENERIC kernels on i386 and amd64 do include the
157 +        option, so the change only affects the custom kernel
158 +        configurations.
159 +
160 +        A new version of ZFS (pool version 5000) has been merged.
161 +        Starting with this version the old system of ZFS pool versioning
162 +        is superseded by "feature flags". This concept enables forward
163 +        compatibility against certain future changes in functionality of ZFS
164 +        pools. The first two read-only compatible "feature flags" for ZFS
165 +        pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
166 +        For more information read the new zpool-features(7) manual page.
167 +        Please refer to the "ZFS notes" section of this file for information
168 +        on upgrading boot ZFS pools.
169 +
170 + 20160906:
171 +        Add support for the MosChip MCS9904 four serial ports
172 +        controller.
173 +
174 +        Add support for walltimestamp in DTrace.
175 +
176 +        Various gdb improvments.
177 +
178 +        ZFS
179 +        Import the zio nop-write improvement from Illumos. To reduce I/O,
180 +        nop-write omits overwriting data if the checksum (cryptographically
181 +        secure) of new data matches the checksum of existing data.
182 +        It also saves space if snapshots are in use.
183 +
184 +        It currently works only on datasets with enabled compression, disabled
185 +        deduplication and sha256 checksums.
186 +
187 +        Add loader(8) tunable to enable/disable nopwrite functionality:
188 +        vfs.zfs.nopwrite_enabled
189 +
190 +        Introduce a new dataset aclmode setting "restricted" to protect ACL's
191 +        being destroyed or corrupted by a drive-by chmod.
192 +
193 +        New loader-only tunables:
194 +        vfs.zfs.sync_pass_deferred_free
195 +        vfs.zfs.sync_pass_dont_compress
196 +        vfs.zfs.sync_pass_rewrite
197 +
198 +        chkgrp(8) add support for q flag
199 +
200 +        Fix problem with the Samsung 840 PRO series SSD detection.
201 +        The device reports support for SATA Asynchronous Notification in its
202 +        IDENTIFY data, but returns error on attempt to enable that feature.
203 +        Make SATA XPT of CAM only report these errors, but not fail the device.
204 +
205 + 20160905:
206 +        Add a resource limit for the total number of kqueues
207 +        available to the user. Kqueue now saves the ucred of the
208 +        allocating thread, to correctly decrement the counter on close.
209 +        Based on FreeBSD SVN 256849
210 +
211 +        Import netcat from OpenBSD 5.2
212 +
213 + 20160904:
214 +        Introduced experimental TCP sysctls starting with
215 +        net.inet.tcp.experimental.initcwnd10
216 +
217 + 20160814:
218 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
219 +        in the release after the fact.
220 +
221 +        tzdata 2016a
222 +
223 + 20160811:
224 +        libdispatch 210
225 +
226 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
227 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
228 +        added WD Red drives.
229 +
230 +        Updated list of pci device vendors.
231 +
232 +        Updated list of usb devices.
233 +
234 + 20160807:
235 +        Implement several changes to libmport to fix some memory corruption issues.
236 +
237 + 20160806:
238 +        sqlite3 3.13.0
239 +
240 + 20160805:
241 +        Merged fixes for libmport that improve error handling when installing packages. Also
242 +        support mkdir -p like behavior for plist entries.
243 +
244 + 20160531:
245 +        Fix four security issues with MidnightBSD.
246 +
247 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
248 +        struct before sending to userland in the linux emulation layer.
249 +
250 +        The compat 43 stat(2) system call exposes kernel stack to userland.
251 +
252 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
253 +        cpio directory traversal and an integer signedness error in the archive
254 +        write zip data routine.
255 +
256 +
257 + 20160528:
258 +        Fixed minor issues with mined(1) and msearch(1).
259 +
260 + 20160526:
261 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
262 +
263 +        Fix libpmc(3) build with clang compiler.
264 +
265 + 20160519:
266 +        Kernel Security updates
267 +
268 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
269 +        local user to overwrite a portion of the kernel memory.
270 +
271 +        Incorrect argument handling in sendmsg(2)
272 +
273 +        Incorrect argument handling in the socket code allows malicious local
274 +        user to overwrite large portion of the kernel memory.
275 +
276 + 20160505:
277 +        OpenSSL security patch
278 +
279 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
280 +        by making sure that always the same bytes are read and compared against
281 +        either the MAC or padding bytes. But it no longer checked that there was
282 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
283 +
284 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
285 +        Base64 encoding of binary data. [CVE-2016-2105]
286 +
287 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
288 +        believed that there can be no overflows in internal code due to this problem.
289 +        [CVE-2016-2106]
290 +
291 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
292 +        a short invalid encoding can casuse allocation of large amounts of memory
293 +        potentially consuming excessive resources or exhausting memory.
294 +        [CVE-2016-2109]
295 +
296 + 20160412:
297 +        0.8 stable branch created. Continue development as 0.9.
298 +
299 +        Fix several issues with wait6 system call addition.
300 +
301 + 20160409:
302 +        libmport now supports two new plist formats:
303 +        @(root,wheel,4775) myfile
304 +        @dir(root,wheel,775) mydir
305 +
306 +        On delete, absoluate paths are now handled properly.
307 +
308 + 20160317:
309 +        OpenSSH doesn't have the luck of the Irish.
310 +
311 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
312 +        run shell commands on the call to xauth.
313 +
314 +        Incorrect argument validation in sysarch(2)
315 +
316 +        A special combination of sysarch(2) arguments, specify a request to
317 +        uninstall a set of descriptors from the LDT.  The start descriptor
318 +        is cleared and the number of descriptors are provided.  Due to invalid
319 +        use of a signed intermediate value in the bounds checking during argument
320 +        validity verification, unbound zero'ing of the process LDT and adjacent
321 +        memory can be initiated from usermode.
322 +
323 +        Patch obtained from FreeBSD.
324 +
325 + 20160229:
326 +        top now displays information on ZFS arc cache.
327 +
328 + 20160228:
329 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
330 +
331 + 20160222:
332 +        Introduce pipe2 to linux emulation layer.
333 +
334 + 20160114:
335 +        OpenSSL
336 +
337 +        The signature verification routines will crash with a NULL pointer dereference
338 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
339 +        mask generation function parameter. [CVE-2015-3194]
340 +
341 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
342 +        memory. [CVE-2015-3195]
343 +
344 +        If PSK identity hints are received by a multi-threaded client then the values
345 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
346 +
347 +        Fix security on bsnmpd configuration file during installation.
348 +
349 +        TCP MD5 signature denial of service
350 +
351 +        A programming error in processing a TCP connection with both TCP_MD5SIG
352 +        and TCP_NOOPT socket options may lead to kernel crash.
353 +
354 +        SCTP
355 +
356 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
357 +        can lead to either a failed kernel assertion or to a NULL pointer
358 +        dereference.  In either case, a kernel panic will follow.
359 +
360 + 20160102:
361 +        Happy New Year
362 +
363 + 20151101:
364 +        Increase kern.ipc.somaxconn default to 256.
365 +
366 + 20151017:
367 +        Add initial statistics api to libmport and a driver to print
368 +        it in mport(1).
369 +
370 + 20151002:
371 +        Revised rpcbind(8) patch to fix issues with NIS
372 +
373 + 20150930:
374 +        In rpcbind(8), netbuf structures are copied directly, which would result in
375 +        two netbuf structures that reference to one shared address buffer.  When one
376 +        of the two netbuf structures is freed, access to the other netbuf structure
377 +        would result in an undefined result that may crash the rpcbind(8) daemon.
378 +
379 + 20150926:
380 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
381 +        to replace @exec and @unexec.  
382 +
383 +        pre exec runs afer pre-install scripts but before actual installation
384 +
385 +        post exec runs after install but before post install scripts and
386 +        pkg message.
387 +
388 +        pre unexec runs before pre uninstall scripts
389 +
390 +        post unexec runs before de-install scripts and after file removal.
391 +
392 + 20150917:
393 +        Fix kqueue write events for files > 2GB
394 +
395 + 20150825:
396 +        kernel:
397 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
398 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
399 +
400 +        openssh:
401 +        A programming error in the privileged monitor process of the sshd(8)
402 +        service may allow the username of an already-authenticated user to be
403 +        overwritten by the unprivileged child process.
404 +
405 +        A use-after-free error in the privileged monitor process of he sshd(8)
406 +        service may be deterministically triggered by the actions of a
407 +        compromised unprivileged child process.
408 +
409 +        A use-after-free error in the session multiplexing code in the sshd(8)
410 +        service may result in unintended termination of the connection.
411 +
412 + 20150818:
413 +        expat security fix
414 +
415 + 20150815:
416 +        libc changes:
417 +        setmode(3) now returns errno consistently on error.
418 +        libc will compile without error using clang
419 +
420 + 20150814:
421 +        wait6 system call added.
422 +
423 +        date(1) now handles non numeric numbers passed to -r
424 +        like GNU coreutils for improved compatibility.
425 +
426 + 20150811:
427 +        ata(4) AMD Hudson2 SATA controller support.
428 +        Intel lynxpoint SATA.
429 +
430 +        Fix some const warnings when building several device drivers
431 +        with llvm/clang.
432 +
433 +        Sync cas(4) with FreeBSD 9-stable.
434 +
435 +        Fix some minor issues with ath(4).
436 +
437 + 20150809:
438 +        xz 5.0.8
439 +
440 + 20150808:
441 +        libmport now logs installation and removal of packages to syslog.
442 +
443 + 20150805:
444 +        routed - fix a potential security issue where traffic from outside
445 +        the network can disrupt routing.
446 +
447 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
448 +        to run.
449 +
450 + 20150802:
451 +        jansson 2.7 library added. (libjansson is a JSON library in C)
452 +
453 + 20150728:
454 +        Heimdal 1.5.2 (kerberos implementation)
455 +
456 +        OpenSSL 1.0.1o
457 +
458 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
459 +
460 +        TCP Resassemly resource exhaustion bug:
461 +        There is a mistake with the introduction of VNET, which converted the
462 +        global limit on the number of segments that could belong to reassembly
463 +        queues into a per-VNET limit.  Because mbufs are allocated from a
464 +        global pool, in the presence of a sufficient number of VNETs, the
465 +        total number of mbufs attached to reassembly queues can grow to the
466 +        total number of mbufs in the system, at which point all network
467 +        traffic would cease.
468 +        Obtained from: FreeBSD 8
469 +
470 +        OpenSSH
471 +
472 +        Fix two security vulnerabilities:
473 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
474 +        offers a certificate. [CVE-2014-2653]
475 +
476 +        OpenSSH servers which are configured to allow password authentication
477 +        using PAM (default) would allow many password attempts. A bug allows
478 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
479 +
480 +
481 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
482 +
483 + 20150726:
484 +        BSD Sort updated
485 +
486 +        sqlite 3.8.10.2
487 +
488 + 20150725:
489 +        Import reallocarray from OpenBSD's libc.  
490 +
491 +        The reallocarray() function is similar to realloc() except it operates on
492 +        nmemb members of size size and checks for integer overflow in the
493 +        calculation nmemb * size.
494 +
495 + 20150722:
496 +        Fix a bug where TCP connections transitioning to LAST_ACK
497 +        state can get stuck. This can result in a denial of service.
498 +
499 + 20150715:
500 +        libmport now supports @shell and @sample in plists. This means that
501 +        a shell port can automatically add an entry to /etc/shells and remove
502 +        it upon uninstallation. For sample files, a copy is made without the
503 +        .sample extension if one does not exist and it is removed automatically
504 +        only if the md5 hash of the two files is the same.
505 +
506 + 20150709:
507 +        flex 2.5.39
508 +
509 + 20150702:
510 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
511 +        with zfs set compression=lz4 pool/path.
512 +
513 +        Verify it's working with
514 +        zfs get compressratio pool/path
515 +        du -h -s *
516 +
517 +        Note you must write new data when turning on compression to see
518 +        changes. Existing files are not compressed.
519 +
520 +        Note: While we used the same basic implementation of lz4 that
521 +        FreeBSD and OpenZFS uses, we did not yet implement features support
522 +        and the zfs version still reports 28. This may come in a future update
523 +        to ZFS.
524 +
525 + 20150621:
526 +        libmport now automatically stops services when deleting packages.
527 +
528 +        The package must have installed an rc.d script in /usr/local/etc
529 +        for this to work. This is equivalent to running service <name> onestop
530 +
531 + 20150618:
532 +        Sendmail
533 +
534 +        With the recent changes to OpenSSL to block 512 bit certificates,
535 +        sendmail can't connect with TLS to some servers.
536 +
537 +        Increase the default size to 1024 bit for client connections to
538 +        match the server configuration.
539 +
540 +        ZFS
541 +
542 +        Added ZFS TRIM support which is enabled by default. To disable
543 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
544 +
545 +        Creating new ZFS pools and adding new devices to existing pools
546 +        first performs a full device level TRIM which can take a significant
547 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
548 +        to disable this behaviour.
549 +
550 +        ZFS TRIM requires the underlying device support BIO_DELETE which
551 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
552 +        via CAM, which are typically supported by SSD's.
553 +
554 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
555 +        under kstat.zfs.misc.zio_trim.
556 +
557 +        rc.d
558 +
559 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
560 +        implies everything is mounted and ready to go.
561 +
562 +        Changed how ip6addressctl maps IPv6 on startup.
563 +
564 + 20150613:
565 +        tzdata 2015d
566 +
567 + 20150612:
568 +        OpenSSL 0.9.8zg
569 +
570 + 20150419:
571 +        MidnightBSD 0.6 stable branch created. Continue 0.7
572 +        development.
573 +
574 + 20150418:
575 +        sqlite 3.8.9
576 +
577 + 20150407:
578 +        Fix two security vulnerabilities:
579 +
580 +        The previous fix for IGMP had an overflow issue. This has been corrected.
581 +
582 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
583 +        suggested Current Hop Limit value of a link, which will replace
584 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
585 +        system.
586 +
587 + 20150319:
588 +        OpenSSL 0.9.8.zf
589 +
590 +        mksh R50e
591 +
592 +        Apple mDNSResponder 561.1.1
593 +
594 + 20150306:
595 +        Upgrade OpenSSL to 0.9.8ze
596 +
597 + 20150225:
598 +        Fix two security vulnerabilities.
599 +
600 +        1. BIND servers which are configured to perform DNSSEC validation and which
601 +        are using managed keys (which occurs implicitly when using
602 +        "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
603 +        unpredictable behavior due to the use of an improperly initialized
604 +        variable.
605 +
606 +        CVE-2015-1349
607 +
608 +        2. An integer overflow in computing the size of IGMPv3 data buffer can result
609 +        in a buffer which is too small for the requested operation.
610 +
611 +        This can result in a DOS attack.
612 +
613 + 20141211:
614 +        Fix a security issue with file and libmagic that can allow
615 +        an attacker to create a denial of service attack on any
616 +        program that uses libmagic.
617 +
618 + 20141109:
619 +        Fix building perl during buildworld when the GDBM port is installed.
620 +
621 + 20141106:
622 +        tzdata 2014i
623 +
624 + 20141102:
625 +        serf 1.3.8
626 +
627 + 20141031:
628 +        tnftp 20141031 fixes a security vulnerability with tnftp,
629 +        CVE-2014-8517.
630 +
631 + 20141028:
632 +        OpenSSL 0.9.8zc
633 +
634 + 20141021:
635 +        Fix several security vulnerabilities in routed, rtsold,
636 +        and namei with respect to Capsicum sandboxes looking up
637 +        nonexistent path names and leaking memory.
638 +
639 +        The input path in routed(8) will accept queries from any source and
640 +        attempt to answer them.  However, the output path assumes that the
641 +        destination address for the response is on a directly connected
642 +        network.
643 +
644 +        Due to a missing length check in the code that handles DNS parameters,
645 +        a malformed router advertisement message can result in a stack buffer
646 +        overflow in rtsold(8).
647 +
648 + 20141011:
649 +        mksh R50d - fix field splitting regression and null
650 +        pointer dereference
651 +
652 +        xz 5.0.7
653 +
654 +        OpenSSH 6.6p1
655 +
656 + 20141004:
657 +        mksh R50c - security update for environment var bug with
658 +        foo vs foo+    
659 +
660 + 20141002:
661 +        sqlite 3.8.6
662 +
663 +        sudo 1.7.8 - some issues with the current version, but we're slowly
664 +        getting up to date.
665 +
666 + 20141001:
667 +        mksh R50b
668 +
669 +        libmport now supports plist commands @dir, @owner, @group, @mode.
670 +
671 +        sudo 1.7.6p2
672 +
673 + 20140916:
674 +        Fix a security issue with TCP SYN.
675 +
676 +        When a segment with the SYN flag for an already existing connection arrives,
677 +        the TCP stack tears down the connection, bypassing a check that the
678 +        sequence number in the segment is in the expected window.
679 +
680 + 20140909:
681 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
682 +        with some programs including Dovecot.
683 +
684 +        OpenSSL security patch:
685 +
686 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
687 +        to consume large amounts of memory. [CVE-2014-3506]
688 +
689 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
690 +        memory. [CVE-2014-3507]
691 +
692 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
693 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
694 +        the stack. [CVE-2014-3508]
695 +
696 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
697 +        a denial of service attack. [CVE-2014-3510]
698 +
699 + 20140902:
700 +        We're now 0.6-CURRENT
701 +
702 +        Update USB quirks to support K70 Corsair keyboard, and several
703 +        other devices.
704 +
705 + 20140827:
706 +        Perl 5.18.2
707 +
708 + 20140728:
709 +        Jails now run shutdown scripts.
710 +
711 + 20140710:
712 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
713 +        before sharing with userland.
714 +
715 + 20140701:
716 +        MKSH R50
717 +
718 + 20140630:
719 +        File 5.19
720 +
721 + 20140605:
722 +        Fix four security issues with OpenSSL
723 +
724 + 20140604:
725 +        Sendmail failed to properly set close-on-exec for open file descriptors.
726 +
727 +        ktrace page fault kernel trace entries were set to an incorrect size which resulted
728 +        in a leak of information.
729 +
730 + 20140430:
731 +        Fix a TCP reassembly bug that could result in a DOS attack
732 +        of the system. It may be possible to obtain portions
733 +        of kernel memory as well.
734 +
735 + 20140411:
736 +        Update zlib to 1.2.7
737 +
738 + 20140122:
739 +        Support for username with length 32. Previous limit was 16
740 +
741 + 20140114:
742 +        Fix two security vulnerabilities.
743 +
744 +        bsnmpd contains a stack overflow when sent certain queries.
745 +
746 +        bind 9.8 when using NSEC3-signed zones zones, will crash with special
747 +        crafted packets.
748 +
749 + 20131228:
750 +        Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
751 +
752 +        Updated em(4), igb(4) and ixgbe(4)
753 +
754 +        MidnightBSD now works with Z87 Intel chipsets.
755 +
756 + 20131207:
757 +        Remove sparc64 architecture. It hasn't been working for awhile
758 +        and it's not useful for desktops anymore.
759 +
760 + 20131205:
761 +        OpenSSH 6.4p1
762 +
763 + 20131203:
764 +        Perl 5.18.1 imported.
765 +
766 +        Update less to v458
767 +
768 + 20131130:
769 +        Remove named from base. We still include the client utilities for
770 +        now until replacements can be found.
771 +
772 + 20131004:
773 +        rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
774 +
775 + 20130917:
776 +        Support for 65,536 routing tables was added.  A new fib specific
777 +        field has been added to mbuf.  This is an increase from 16.
778 +
779 + 20130910:
780 +        Security updates: (kern.osreldate 5001)
781 +
782 +        nullfs(5)
783 +
784 +        The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
785 +        check whether the source and target of the link are both in the same
786 +        nullfs instance.  It is therefore possible to create a hardlink from a
787 +        location in one nullfs instance to a file in another, as long as the
788 +        underlying (source) filesystem is the same.
789 +
790 +        ifioctl
791 +
792 +        As is commonly the case, the IPv6 and ATM network layer ioctl request
793 +        handlers are written in such a way that an unrecognized request is
794 +        passed on unmodified to the link layer, which will either handle it or
795 +        return an error code.
796 +
797 +        Network interface drivers, however, assume that the SIOCSIFADDR,
798 +        SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
799 +        handled at the network layer, and therefore do not perform input
800 +        validation or verify the caller's credentials.  Typical link-layer
801 +        actions for these requests may include marking the interface as "up"
802 +        and resetting the underlying hardware.
803 +
804 + 20130824:
805 +        Fix a bug in sendmail 8.14.7 that interferes with how it
806 +        handles AAAA records interoperating with Microsoft DNS servers.
807 +        FreeBSD has already reported this to Sendmail and a fix
808 +        will be included in the next release.
809 +
810 +        Subversion 1.8.1 is now in the base system as a static
811 +        binary.  It has limited functionality, but can be used to
812 +        checkout/commit code.  It is named svnlite.
813 +
814 + 20130822:
815 +        Fix two security vulnerabilities.
816 +
817 +        Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
818 +        This could be exploited to read memory by a user process.
819 +
820 +        When initializing the SCTP state cookie being sent in INIT-ACK chunks,
821 +        a buffer allocated from the kernel stack is not completely initialized.
822 +
823 +        Import xz 5.0.4
824 +
825 +        Import sqlite 3.7.17
826 +
827 +        Import BIND 9.8.5-P2
828 +
829 + 20130814:
830 +        mksh R48 imported.
831 +
832 +        Sendmail 8.14.7 imported.
833 +
834 + 20130717:
835 +        libmport bug was fixed causing hash verification to fail.
836 +
837 +        virtio(4) imported from FreeBSD 9-stable. SCSI support not
838 +        included.
839 +
840 + 20130612:
841 +        RELENG_0_4 created for 0.4. Development continues on 0.5.
842 +
843 + 20130402:
844 +        Update BIND and OpenSSL to resolve security advisories.
845 +
846 + 20130305:
847 +        MKSH R44 imported.
848 +
849 + 20130213:
850 +        MKSH R42b imported
851 +
852 + 20130211:
853 +        MKSH R42 imported
854 +
855 + 20130125:
856 +        MKSH R41 imported
857 +
858 + 20130122:
859 +        OpenSSH 5.8p2 imported
860 +
861 +        SQLite 3.7.15.2 imported
862 +
863 +        Fixed a longstanding bug in libmport extrating new index files.
864 +
865 + 20120710:
866 +        BSD licensed sort imported from FreeBSD-CURRENT
867 +
868 +        For now, GNU sort is installed as gnusort, but it will
869 +        go away in time.
870 +
871 + 20120708:
872 +        tcsh 6.18.01 imported.
873 +
874 +        NetBSD's iconv imported.
875 +
876 +        libc gains strnlen(3), memrchr(3), stpncpy(3).
877 +
878 + 20120612:
879 +        BIND security update related to CVE-2012-1667.
880 +
881 +        Zero length resource records can cause BIND to crash resulting
882 +        in a DOS attack or information disclosure.
883 +
884 + 20120407:
885 +        mksh R40f (fixes regression)
886 +
887 + 20120328:
888 +        mksh R40e
889 +
890 +        Perl 5.14.2
891 +
892 + 20120229:
893 +        cpucontrol(8) and cpuctl(4) added from FreeBSD 7-stable.
894 +
895 + 20120209:
896 +        mDNSResponder 333.10 imported
897 +
898 + 20111227:
899 +        import raid5 module for GEOM, graid5(8)
900 +
901 +        This is experimental and known to use a lot of kernel
902 +        memory.
903 +
904 + 20111223:
905 +        telnetd: fix a root exploit from a fixed buffer that was not checked
906 +
907 +        pam: don't allow escape from policy path.  Exploitable in KDE, etc.
908 +
909 +        Fix pam_ssh module:
910 +
911 +        If the pam_ssh module is enabled, attackers may be able to gain access
912 +        to user accounts which have unencrypted SSH private keys.
913 +
914 +        This has to due with the way that openssl works.  It ignores unencrpted data.
915 +
916 +        Fix security issue with chroot and ftpd.
917 +
918 +        nsdispatch(3) doesn't know it's working in a chroot and some
919 +        operations can cause files to get reloaded causing a security
920 +        hole in things like ftpd.
921 +
922 + 20111217:
923 +        libdialog/dialog upgraded to an lgpl version. As it's not
924 +        backwardly compatable, include the old libdialog as libodialog
925 +
926 + 20111212:
927 +        mksh r40d imported
928 +
929 + 20111210:
930 +        re(4) and rl(4) updated to support new chips.
931 +
932 +        GEOM synced with FreeBSD 7-stable.
933 +
934 +        MidnightBSD GPT partition types created in sys/gpt.h and
935 +        setup in boot loader and GEOM.
936 +
937 +        amdsbwd(4) (amd watchdog for south bridge) updated to support
938 +        8xx series chipset.
939 +
940 + 20111207:
941 +        import bsd grep from FreeBSD/OpenBSD.
942 +
943 +        MK_BSD_GREP controls which grep is installed
944 +        as grep with the other as bsdgrep or gnugrep.
945 +
946 + 20111122:
947 +        mksh vR40c imported.
948 +
949 + 20111117:
950 +        BIND 9.6 ESV R5 P1
951 +
952 + 20111107:
953 +        tzdata 2011n
954 +
955 + 20111026:
956 +        mDNSResponder v320
957 +
958 +        BIND 9.6 ESV R5
959 +
960 + 20111022:
961 +        cflow 0.0.6 imported
962 +
963 + 20111020:
964 +        less v436 imported
965 +
966 +        amdsbwd(4) AMD southbridge watchdog
967 +
968 + 20111019:
969 +        awk 20110810 imported
970 +
971 +        et(4) Agere Gigabit Ethernet/Fast Ethernet driver added, but
972 +        not included in GENERIC kernel.  The kernel module needs
973 +        testing before we can include it in GENERIC.
974 +
975 +        intr_bind code ported to allow an IRQ to be bound to one
976 +        specific CPU core.
977 +
978 + 20111017:
979 +        Time Zone Data v. 2011l (Released 10 October 2011)
980 +
981 +        Updated list of countries (iso3166) to work with new timezone data.
982 +
983 + 20111015:
984 +        Introduce CPU Affinity in MidnightBSD. cpuset(1) can be used
985 +        to control which core or group of cores can be used for a given
986 +        process. Several new system calls were added to support this
987 +        functionality in the running kernel and for 32bit binary
988 +        compatibility on amd64.
989 +
990 +        The scheduler default has been changed to ULE in i386 and
991 +        amd64.  Changes were made to both schedulers (4BSD AND ULE)
992 +        for this feature.
993 +
994 +        This work is based on Jeff Roberson's FreeBSD 7.1 patches.
995 +
996 + 20111004:
997 +        Fix a problem with unix socket handling caused by the recent
998 +        patch to unix socket path handling. This allows network
999 +        apps to work under the linuxolator again.
1000 +
1001 + 20111001:
1002 +        Import libfetch & fetch(1) from FreeBSD 9. Passive FTP is
1003 +        now default and an environment variable must be set to use
1004 +        active.
1005 +
1006 + 20110930:
1007 +        Introduce quirks handling for several umass devices including
1008 +        USB cameras.  Add workaround for Cyberpower UPS devices.
1009 +
1010 +        Bring in further bug fixes from FreeBSD and NetBSD for alc(4).
1011 +        Stale ip/tcp header pointers are no longer used, lockups fixed
1012 +        when network cable is unplugged on bootup, enable TX checksum
1013 +        offloading.
1014 +
1015 +        Add a new man page for gcache(8), a useful geom class when
1016 +        working with large raid3 sets.
1017 +
1018 +        Restore previous workaround for Cypress pata storage controller.
1019 +
1020 + 20110929:
1021 +        Sync ath(4) with FreeBSD 7.3.
1022 +
1023 +        The following modules are no longer available, and should be
1024 +        removed from loader.conf:
1025 +        ath_hal ath_rate_amrr ath_rate_onoe ath_rate_sample
1026 +
1027 +        alc(4) would hibernate when a cable was unplugged and often
1028 +        required bring the interface down and up to "wake up" so that
1029 +        a connection could be established.  Disable hibernation.
1030 +
1031 + 20110928:
1032 +        Fix security issues with gzip and compress related to .Z
1033 +        files that are corrupted.
1034 +
1035 +        Fix path validation with unix domain sockets.
1036 +
1037 + 20110917:
1038 +        Remove dependance on mports perl for generating releases as
1039 +        it's in the base system.
1040 +
1041 + 20110914:
1042 +        Import xz 5.0.3 with liblzma 5.0.3
1043 +
1044 + 20110813:
1045 +        synced the sparc64 GENERIC kernel configuration with amd64.
1046 +
1047 + 20110806:
1048 +        sqlite 3.7.7.1 imported
1049 +
1050 +        msearch(1), libmsearch and msearch.import added.  msearch(1) provides
1051 +        a full text search command line tool.  libmsearch can also be used
1052 +        to build a graphical based search in the future. You can enable
1053 +        index building for msearch in periodic.conf or manually run the
1054 +        /usr/libexec/msearch.index tool.  Full text indexes take considerable
1055 +        space in /var.  I'm using approximately 500MB currently.
1056 +
1057 +        Fix a long standing bug with the periodic script to check package
1058 +        versions.  This will be obsolete with mport though.
1059 +
1060 + 20110710:
1061 +        kdb_enter_why added to MidnightBSD to allow the kernel debugger to
1062 +        know why it's in use and thus script can be run.
1063 +
1064 +        Yet another problem with the perl manifest was fixed
1065 +
1066 + 20110709:
1067 +        cpufreq(1) is a new utility to monitor CPU frequency which may change
1068 +        with use of powerd(8) and cpufreq(4).
1069 +
1070 + 20110612:
1071 +        Update mksh to R40
1072 +
1073 +        Catch up ObsoleteFiles.inc to remove Perl 5.10.x.  Good to run when
1074 +        updating current (cd /usr/src && make check-old)
1075 +
1076 + 20110528:
1077 +        Fix CVE-2011-1910 in BIND 9.6.x.  This affects caching resolvers.
1078 +
1079 + 20110526:
1080 +        newfs:
1081 +        Raised the default blocksize for UFS/FFS filesystems from
1082 +        16K to 32K and the default fragment size from 2K to 4K.
1083 +
1084 +        This should slightly imporve performance on "advanced format"
1085 +        hard drives such as the WD EARS drives. Drives of this type
1086 +        have emulation modes that slow down with lower sizes.  Of course
1087 +        the drive must still be aligned properly when using fdisk.
1088 +
1089 + 20110521:
1090 +        mport tool now has a deleteall command.  This can be used to remove
1091 +        all packages from a system.
1092 +
1093 +        A few bugs with the perl 5.14 import have been fixed.
1094 +
1095 + 20110518:
1096 +        Perl 5.14.0
1097 +
1098 + 20110517:
1099 +        Sendmail 8.14.5
1100 +
1101 + 20110314:
1102 +        DRM/DRI code updated to support newer video cards. (FreeBSD 7.1)
1103 +
1104 +        cdevpriv wrappers added
1105 +
1106 +        nss_mdns hack introduced to work around linking problem.
1107 +
1108 +        dnsextd fixed after update to mDNSResponder code.
1109 +
1110 + 20110308:
1111 +        Introduce liblzma & xz 5.0.1 to the base system
1112 +
1113 +        Patch for OpenSSL security issue CVE-2011-0014.
1114 +
1115 +        "OSREVISION 4004"
1116 +
1117 +        nsswitch module for multicast dns (nss_mdns) added.
1118 +
1119 +        tzdata2011c
1120 +
1121 + 20110220:
1122 +        cam(4) syncronized with FreeBSD 7.3.
1123 +
1124 + 20110219:
1125 +        amdtemp(4) updated to support sensors framework.
1126 +
1127 + 20110217:
1128 +        Perl 5.10.1 imported
1129 +
1130 + 20110216:
1131 +        Introduce igb(4) and split Intel Gigabit Ethernet adapters between
1132 +        igb(4) and em(4).  Newer devices use igb(4).  The code has moved
1133 +        to sys/dev/e1000 for both devices in the kernel. igb(4) has
1134 +        been placed in GENERIC on i386 and amd64.
1135 +
1136 +        Update bfe(4) to support newer devices and WOL.
1137 +
1138 + 20110215:
1139 +        age(4) added.
1140 +
1141 + 20110208:
1142 +        BIND 9.6.3 which fixes a bug with DNSSEC records getting added.
1143 +
1144 + 20110206:
1145 +        eeemon(4) added to monitor Asus Eee PC.
1146 +
1147 + 20110205:
1148 +        OpenSSH 5.7p1
1149 +
1150 +        GNU sort 6.9 (coreutils)
1151 +
1152 + 20110203:
1153 +        one true awk 20100523 imported
1154 +
1155 +        sqlite 3.7.5
1156 +
1157 +        OpenSSL 0.9.8q
1158 +
1159 + 20110202:
1160 +        tcsh 6.17.00
1161 +
1162 +        file 5.05
1163 +
1164 + 20110122:
1165 +        Import it(4) and lm(4), with support for Super I/O hardware monitors. This
1166 +        uses the sensors framework ported by Constantine A. Murenin (GSOC2007)
1167 +
1168 + 20110120:
1169 +        BIND 9.6.2-P3
1170 +
1171 +        sudo 1.7.4-p6
1172 +
1173 + 20110115:
1174 +        Add experimental jme(4) for Jmicron ethernet devices.
1175 +
1176 + 20101130:
1177 +        A double free exists in the SSL client ECDH handling code, when
1178 +        processing specially crafted public keys with invalid prime
1179 +        numbers. [CVE-2010-2939]
1180 +
1181 + 20101120:
1182 +        Several portions of the kernel and userland code related to UFS file
1183 +        systems (and UFS2) cannot properly handle inode counts above 2^31 due
1184 +        to use of int types.  Based on a patch from FreeBSD, I've modified
1185 +        our UFS2 implementation to handle unsigned values for inode counts
1186 +        which should allow for file systems greater than 16TB.
1187 +
1188 +        newfs and growfs was also modified.
1189 +
1190 + 20101110:
1191 +        Fix a security issue with pseudofs which could result in running code in kernel
1192 +        context or a kernel panic depending on system configuration.  This affects file
1193 +        systems such as procfs for instance.
1194 +
1195 + 20101021:
1196 +        sysrc is a utility to print and modify name/value pairs in /etc/rc.conf easily.
1197 +        This is similar to functions present in many linux distros. The utility was
1198 +        written by Devin Teske for FreeBSD.
1199 +
1200 + 20100920:
1201 +        bzip2 security patch for integer overflow.
1202 +
1203 + 20100905:
1204 +        MidnightBSD RELENG_0_3 branch created.  Aggressive development continues here
1205 +        for 0.4.
1206 +
1207 + 20100902:
1208 +        Fix a security issue with libutil that allows users to bypass cpu limits in
1209 +        login.conf in some cases.  This combined with OpenSSH for example can allow
1210 +        the user to get more resources than they're allowed.
1211 +
1212 + 20100822:
1213 +        Import Apple's mDNSResponder (mdnsd).
1214 +
1215 + 20100814:
1216 +        libdispatch added to MidnightBSD.  This provides functionality found in
1217 +        Mac OS X's GCD.  We do not have blocks support yet.  As this code is
1218 +        licensed under Apache 2, we create a new MK_APACHE option so that
1219 +        it's not required for all users to run code under a license they
1220 +        may not like.
1221 +
1222 + 20100713:
1223 +        mbuf readonly fix related to sendfile(2) data corruption.
1224 +
1225 + 20100704:
1226 +        brainfuck(1) imported from MirBSD.
1227 +
1228 + 20100505:
1229 +        zlib 1.2.5
1230 +
1231 + 20100430:
1232 +        Sudo 1.7.2p6 imported
1233 +
1234 + 20100321:
1235 +        Update zlib to 1.2.4
1236 +
1237 + 20100319:
1238 +        Removed i586 from default i386 generic kernel.
1239 +
1240 + 20100317:
1241 +        Update to tzdata2010e (time zones).  This includes changes in
1242 +        Mexico.
1243 +
1244 +        Add support for several newer sound cards via hda including
1245 +        ATI and Realtek chipsets.
1246 +
1247 + 20100313:
1248 +        CPU detection has been changed.  VIA Padlock detection added.
1249 +
1250 + 20100312:
1251 +        Fix a number of bugs and compiler warnings in libmport. Handle
1252 +        plus signs in paths for mport.check-fake
1253 +
1254 + 20100311:
1255 +        mksh R39c
1256 +
1257 + 20100309:
1258 +        Sudo 1.7.2p5
1259 +
1260 +        sqlite3 3.6.23
1261 +
1262 +        mksh R39b
1263 +
1264 +        libffi (ffi) 3.0.9
1265 +
1266 + 20100206:
1267 +        WITHOUT_LIB32 is no longer needed on AMD64.  GCC was fixed to
1268 +        properly pass arguments to ld.
1269 +
1270 +        re(4) and rl(4) have been updated to support several new
1271 +        realtek chipsets.  Performance has been improved on re(4).
1272 +
1273 + 20100204:
1274 +        Fix a bug cropping up on AMD64 MidnightBSD with sftp
1275 +        segfaulting.  
1276 +
1277 + 20100116:
1278 +        Import ash changes from FreeBSD (bin/sh) 8-Stable.
1279 +
1280 +        BIND 9.6.1-P2
1281 +
1282 + 20100110:
1283 +        Import Sendmail 8.14.4. Fix for SSL vulnerability.
1284 +
1285 +        posix_spawn(3) added to MidnightBSD libc.  Users may need to build and
1286 +        install libc before doing a full buildworld when upating from 0.2 or
1287 +        older current systems.
1288 +
1289 +        kqueue(2) was modified to support portions of libdispatch functionality.
1290 +
1291 + 20100106:
1292 +        Bind security update.  Fix a bug with DNSSEC that causes negative
1293 +        cache entries and thus a possible DNS cache poisoning attack.
1294 +
1295 +        Fix a bug in ZFS that can reset permissions on system crashes.
1296 +
1297 + 20091228:
1298 +        amdtemp(4) was added.  It allows one to monitor to the temperature
1299 +        of an AMD CPU such as a Phenom.
1300 +
1301 + 20091205:
1302 +        OpenSSL security fix
1303 +
1304 +        The SSL version 3 and TLS protocols support session renegotiation without
1305 +        cryptographically tying the new session parameters to the old parameters.
1306 +
1307 + 20091128:
1308 +        OpenBSD sensors framework imported including sensorsd(8)
1309 +
1310 + 20091126:
1311 +        OpenNTPD 4.4 import
1312 +
1313 +        Update OpenSSH to 5.3p1
1314 +
1315 +        mksh R39
1316 +
1317 + 20091124:
1318 +        cpdup updated from DragonFly to 1.15
1319 +
1320 +        tzdata2009s updated with latest timezone data for November 2009.
1321 +
1322 + 20091010:
1323 +        amd64 users should use WITHOUT_LIB32=yes in /etc/make.conf for now
1324 +        to test current.
1325 +
1326 +        Revert unicode filename fixes from ntfs code.  This was causing chaos
1327 +        on amd64 systems.
1328 +
1329 + 20091006:
1330 +        Update timezone data with tzdata2009n with the Pakistan and
1331 +        Argentina changes.
1332 +
1333 +        Sync several userland utilities with versions from FreeBSD 7.0 in
1334 +        sbin and usr.sbin.
1335 +
1336 + 20090919:
1337 +        Update timezone data with tzdate2009m from September 2009.
1338 +
1339 + 20090729:
1340 +        Patch for Bind 9 security vulnerability. a dynmaic update packet
1341 +        can trigger an assertion and cause named to exit
1342 +
1343 + 20090606:
1344 +        Remove PCC from the base system.  This compiler will not work
1345 +        as a system compiler for us as we've got some userland investment
1346 +        in C++ code and may have Objective-C in the future.  We're stuck
1347 +        with a solution that supports these three languages at a minimum.
1348 +
1349 +        I had wanted to keep it as an optional compiler because it is
1350 +        fast, however too many users want to try to use it for the base
1351 +        system which makes no sense.
1352 +
1353 +        A hack was added for Cypress based usb hard drive enclosures to
1354 +        the kernel.  This should cut down on commands it claims to support
1355 +        but does not (at the cam layer).  Found while testing ZFS on
1356 +        an external device.
1357 +
1358 + 20090520:
1359 +        The powerd daemon no longer starts automatically to improve
1360 +        compatibility with many systems.  However, there is a new
1361 +        installer option in the startup section to enable it. This
1362 +        makes it easier to enable for users that have working systems. I                thought it was only a problem on older hardware, but it freaks
1363 +        out my new Phenom too.
1364 +
1365 + 20090502:
1366 +        OpenSSH 5.2p1 import
1367 +
1368 +        ale(4) connected to the build. (kernel module only)
1369 +
1370 + 20090501:
1371 +        Imported makefs utility from NetBSD/FreeBSD
1372 +
1373 + 20090422:
1374 +        OpenSSL security update
1375 +
1376 +        The function ASN1_STRING_print_ex does not properly validate the lengths
1377 + of BMPString or UniversalString objects before attempting to print them.
1378 +
1379 + 20090415:
1380 +        Created a Symbol.map for libc/ohash symbols
1381 +
1382 +        Updated several usr/bin usr/sbin utilities.
1383 +
1384 +        Corrected a bug with Makefile.inc1 causing the bootstrap
1385 +        tools to fail.
1386 +
1387 + 20090405:
1388 +        xorg 7.4 wants to configure its input devices via hald which does not
1389 +        yet work with USB. If the keyboard/mouse does not work in xorg then
1390 +        add
1391 +                Option "AllowEmptyInput" "off"
1392 +        to your ServerLayout section.  This will cause X to use the configured
1393 +        kbd and mouse sections from your xorg.conf
1394 +
1395 + 20090403:
1396 +        mksh was disconnected a few day ago do to bugs with
1397 +        buildworld and mports.  Now, connect it back
1398 +        for use as /bin/sh with a conditional called
1399 +        MK_ASH.  By default, ash is the standard /bin/sh
1400 +        but we may change this later.  This will allow further
1401 +        testing by users and developers of mksh without
1402 +        causing an unpleasant default experience.  In the
1403 +        long run, we need to fix mksh compatibility.
1404 +
1405 + 20090328:
1406 +        Bring in mksh R37 from CVS. The dot.mkshrc files for root
1407 +        and skel were changed.  mksh(1) now replaces ash aka sh(1)
1408 +        as the default /bin/sh.  Please report bugs with
1409 +        ports, etc. The ash code will remain in the repo for awhile
1410 +        as I decide if we'll add something like MK_SHELL_ASH as
1411 +        an optional build parameter.  
1412 +
1413 +        ahd was disconnected from the lint environment until
1414 +        the compiler bug is sorted (by updating gcc?)
1415 +
1416 +        Remove freebsd-tips from fortune files and change the
1417 +        default for login and profile.
1418 +
1419 + 20090327:
1420 +        Update libarchive to 2.5.5, tar, and add bsdcpio.
1421 +
1422 +        Also previously, ctriv has been connecting Perl 5.10
1423 +        to the build (part of os).  This will have an impact
1424 +        on mports.
1425 +
1426 + 20090325:
1427 +        Update Bind to 9.4.3-P1
1428 +
1429 +        Update mksh to R36b
1430 +
1431 +        Update tcpdump to 3.9.8, fix libpcap to work with current.
1432 +
1433 +        Update pnpinfo, sync with FreeBSD.
1434 +
1435 + 20090115:
1436 +        Fix a problem with DNSSEC and BIND.
1437 +
1438 + 20090110:
1439 +        For applications using OpenSSL for SSL connections, an invalid SSL
1440 +        certificate may be interpreted as valid.  This could for example be
1441 +        used by an attacker to perform a man-in-the-middle attack.
1442 +
1443 +        Other applications which use the OpenSSL EVP API may similarly be
1444 +        affected.
1445 +
1446 +        Stop cross site request forgery attacks in lukemftpd
1447 +
1448 + 20090104:
1449 +        Import GNU libreadline 5.2
1450 +
1451 + 20090101:
1452 +        Update time zone data to 2008i.
1453 +
1454 + 20081231:
1455 +        Correct a problem where bluetooth and netgraph sockets are not
1456 +        properly initialized.
1457 +
1458 +        Happy 2009.
1459 +
1460 + 20081206:
1461 +        Due to the massive change in the underlying system under way,
1462 +        we're naming the next release 1.0.  The sys/sys/param.h was
1463 +        changed accordingly.  ipfilter and ncurses were corrected
1464 +        using __MidnightBSD__ tests in the code.  
1465 +
1466 +        The GENERIC kernel config was caught up on i386 today.  Consider
1467 +        i386 still broken, but amd64 is running again.
1468 +
1469 +        mdoc.local was updated with the new MidnightBSD version info.
1470 +
1471 +        batt(1) was rewritten in C.  It now supports several flags and
1472 +        runs about 8 times faster on my laptop.  The default output
1473 +        shows the number of minutes of battery life remaining and the
1474 +        percentage.  You can use -u to display the number of batteries or
1475 +        -c to get script friendly output.  Consult the man page for more.
1476 +
1477 + 20081204:
1478 +        Work has completed on importing ZFS, jemalloc, several
1479 +        new devices, SCTP, updated pf, a new tempfs, linuxolator 2.6 kernel
1480 +        support, improved locking for file desc., audit (openbsm),
1481 +        openssl .98e, nfe, imporved intel high def audio, midi, updated
1482 +        intel gigabit (em), support for several wifi cards (intel), ...
1483 +
1484 +        Renamed 0.3-CURRENT officially. Switched to using MidnightBSD version
1485 +        data from param.h instead of the FreeBSD version.  This means
1486 +        testing is now possible in the ports tree for the version
1487 +        and that any ports or code relying on the FreeBSD version from
1488 +        sys/sys/param.h will need to be fixed.
1489 +
1490 + 20080905:
1491 +        update nve(4) to support new hardware.
1492 +
1493 + 20080801:
1494 +        Import OpenBSM 1.0
1495 +
1496 +        Modify src/release to create 3 isos instead of 2 for packages.
1497 +
1498 +        etc/rc.d/firstboot now enables kdm, gnustep + slim and bsdstats.
1499 +
1500 +        Many ia64, alpha, powerpc items were removed.
1501 +
1502 +        The recent diffutils 2.8.7 import was fixed.
1503 +
1504 + 20080703:
1505 +        pcc was not installed properly when setting DESTDIR for live cds,
1506 +        or posibly jails.
1507 +
1508 + 20080627:
1509 +        Add firmware(9), WEP, CCMP, TKIP to GENERIC.
1510 +
1511 +        Add glabel to GENERIC.
1512 +
1513 +        Intel ICH8 mobile chipset used on some iMacs included with ata.
1514 +
1515 +        pcc connected to the build on i386. (alternative compiler)
1516 +
1517 +        ath added to GENERIC.  (Atheros wireless NICs) on amd64/i386
1518 +
1519 + 20080528:
1520 +        Sendmail 8.14.3
1521 +
1522 + 20080516:
1523 +        ssh-vulnkey allows you to look for vulnerable ssh keys that
1524 +        were generated on Debian and Ubuntu hosts over the last
1525 +        few years.  sshd can block offending keys with a configuration
1526 +        option.
1527 +
1528 +        The elf note on binaries is now set to MidnightBSD.
1529 +
1530 + 20080514:
1531 +        Fixed a number of problems with pcc.  It is not yet connected
1532 +        to the build, but usable on i386 hosts.  You may use it
1533 +        by make; make install in /usr/src/usr.bin/pcc.  It will
1534 +        install in /usr/local as some of the files conflict with
1535 +        GCC versions. __MidnightBSD__ is defined in PCC as well.
1536 +
1537 +        System headers were fixed to allow pcc to compile many binaries
1538 +        on MidnightBSD.  bin/cp will work now for instance.
1539 +
1540 + 20080430:
1541 +        __MidnightBSD__ is now defined via gcc.  This can be tested
1542 +        to determine we're running on MidnightBSD in the preprocessor.
1543 +
1544 + 20080429:
1545 +        Import bind 9.4.2 with threading
1546 +
1547 +        libpthread (KSE) and libthr are built earlier
1548 +        
1549 +        pcvt(4) removed!
1550 +
1551 +        Alias added for core2 cpus.
1552 +
1553 +        Alpha and PC98 only utilities removed from usr/sbin
1554 +
1555 +        syslogd, adduser, rmuser, mergemaster and mailwrapper have been
1556 +        improved.  See the man pages for info.
1557 +
1558 +        periodic scripts will not send emails with empty message bodies.
1559 +        See mailwrapper fix.
1560 +
1561 + 20080410:
1562 +        Sync cpdup with DragonFly.  Add parallel transaction support and
1563 +        -l flag to line-buffer stdout and stderr.
1564 +
1565 + 20080406:
1566 +        Import bzip2 1.05
1567 +        Import OpenSSH 4.9p1
1568 +
1569 + 20080322:
1570 +        The default umask was changed to 022.
1571 +        
1572 +        /usr/X11R6 paths were removed from several config files.
1573 +
1574 +        .mkshrc files are now installed for root.
1575 +
1576 + 20080316:
1577 +        FIx a problem with gif0 tunnels and neighbors with IPV6.
1578 +
1579 + 20080312:
1580 +        Add lndir from X.org.  This aides in the porting of MirPorts.
1581 +
1582 +        New OS versions were added to the mapage code (groff)
1583 +
1584 + 20080310:
1585 +        Correct a buffer overflow in ppp.
1586 +
1587 + 20080308:
1588 +        Remove /usr/X11R6 from manpath config.
1589 +
1590 + 20080307:
1591 +        Atheros driver no longer has several options set
1592 +        which corrects building in tinderbox on all three platforms.
1593 +
1594 +        Added a new macro to sx.h which returns true if the current
1595 +        thread holds an exclusive lock on a specifix sx.
1596 +
1597 +        Removed OS/2's HPFS file system.   It's not maintained and
1598 +        I don't know anyone using OS/2 or ecomstation these days.
1599 +        My copy is in the closet collecting dust.
1600 +
1601 + 20080306:
1602 +        Synced tinderbox with FreeBSD.  Modified it for MidnightBSD.
1603 +        Developers can now use it to check src builds.
1604 +
1605 + 20080303:
1606 +        Add mksh to /etc/shells, made some adjustments to options
1607 +        for mksh builds per suggestion upstream.
1608 +
1609 +        USB HID table updated with modern hardware list.
1610 +
1611 +        Updated BSD family true (we're not in there yet)
1612 +
1613 +        iso3166 file updated and import of tzdata2007k for
1614 +        new time zones.
1615 +
1616 +        Updated mksh to latest version R33.
1617 +
1618 + 20080228:
1619 +        Remplaced the random IP id generation code with a new
1620 +        version by Amit Klein.
1621 +
1622 + 20080221:
1623 +        Sendfile write only permissions fix.
1624 +
1625 +        Removed some HPFS and PC98 code.
1626 +
1627 +        iso639 file sycned with DragonFly.
1628 +
1629 + 20080128:
1630 +        Changed NTP configuration so that ips aren't cached
1631 +        so multiple servers are used.
1632 +
1633 +        Fix an issue with fork() in libpthread.
1634 +
1635 + 20080121:
1636 +        Add virtualization detection to set the HZ rate
1637 +        according to a VM present.  VMWare and Parallels
1638 +        should work better like this.
1639 +
1640 +        Change to full x11 install in sysinstall.  Add
1641 +        xorg 7 support.
1642 +
1643 + 20080115:
1644 +        Fix the handling of PTY's.  CVE-2008-0216
1645 +
1646 + 20080105:
1647 +        mport delete code added, USE_MPORT_TOOLS knob aded.
1648 +
1649 + 20080101:
1650 +        Happy New Year
1651 +
1652 + 20071123:
1653 +        Update sendmail to 8.14.2
1654 +
1655 + 20071120:
1656 +        Update system compiler to gcc 3.4.6.
1657 +
1658 + 20071023:
1659 +        Updated mksh to R31d.
1660 +
1661 + 20070911:
1662 +        Updated mksh to version R31b.
1663 +
1664 +        Fixed stderr output in libpthread.  Previously it was
1665 +        written to stdout.
1666 +
1667 + 20070831:
1668 +        Added dot.mkshrc file to support the recent change to
1669 +        mksh from OpenBSD's ksh derived from pdksh.  
1670 +
1671 +        Added new firewall configuration.  ipfw is enabled by default
1672 +        with a "desktop" configuration.  Consult /etc/rc.firewall
1673 +        or ipfw show to see the ruleset used.  You can disable
1674 +        ipfw by setting firewall_enable="NO" in /etc/rc.conf This
1675 +        change only effects IPv4.  IPv6 does not have a firewall
1676 +        enabled by default.
1677 +
1678 + 20070814:
1679 +        Removed GNU tar source.  We've been using BSD tar
1680 +        for awhile.
1681 +
1682 + 20070806:
1683 +        Finished removing umapfs and autofs from the tree.
1684 +
1685 + 20070804:
1686 +        BIND and Tcpdump have been patched for recent vulnerabilities.
1687 +
1688 +        We switched to BSD cpio (pax).
1689 +
1690 + 20070719:
1691 +        Imported cpdup from DragonFly as /bin/cpdup
1692 +
1693 + 20070716:
1694 +        Update GNU cpio to 2.8.
1695 +
1696 + 20070410:
1697 +        cvs was updated to 1.12.13.  cvsbug was removed.
1698 +        cvs now behaves similarly to DragonFly's cvs with
1699 +        most of their local changes.  
1700 +
1701 + 20070409:
1702 +        RELENG_0_1 was created. More aggresive changes will
1703 +        continue here.
1704 +
1705 + 20070406:
1706 +        Back out propolice.  propolice caused several problems
1707 +        with our threading libraries libthr and libpthread.  
1708 +        curthread was often NULL after the patch and many
1709 +        multithreaded applications would crash.  We plan to
1710 +        work on either bringing in gcc 4.1 or developing a new
1711 +        patch which also corrects our threading issues later.
1712 +
1713 +        It is more important to have a stable system for our
1714 +        mport work and other projects at this time.
1715 +
1716 +        This is not a clean removal.  It is recommended that you
1717 +        have a recently SNAP CD handy.  You can either reinstall
1718 +        or perform a make buildworld and make buildkernel and
1719 +        make installkernel.  Reboot on the cd and copy the contents
1720 +        of /bin, /sbin, /lib, /libexec, and /usr/bin, /usr/sbin,
1721 +        /usr/lib, and /usr/libexec to the respective directories on
1722 +        your disk.  Then you should be able to boot into single user
1723 +        mode and run make installworld.  You will need to run
1724 +        chflags noschg on some of the files if you can't overwrite
1725 +        them.
1726 +
1727 +        You will get __guard missing errors since we had to remove
1728 +        this from libc.
1729 +
1730 +        You will need to rebuild any ports built while propolice was
1731 +        installed.
1732 +
1733 + 20070401:
1734 +        Importing propolice into MidnightBSD. Propolice is going to
1735 +        provide us with much greater security and stability in the
1736 +        long run. If upgrading from a pre-propolice system, please
1737 +        follow the these instructions:
1738 +
1739 +        cd /usr/src/lib/libc && make obj && make && make install
1740 +        cd /usr/src/gnu/usr.bin/cc && make obj && make && make install
1741 +        cd /usr/src/lib/libpthread && make obj && make && make install
1742 +        cd /usr/src/lib/libthr && make obj && make && make install
1743 +        buildworld and kernel
1744 +
1745 +        It is adviced that any mports which were installed and/or built
1746 +        prior to the propolice update also be updated. If any errors
1747 +        or issue are encounted, please contact security@midnightbsd.org
1748 +        and we will be sure to investigate and come up with an expeditious
1749 +        fix.
1750 +
1751 + 20070314:
1752 +        Remove send-pr from src.
1753 +
1754 +        Switch to NetBSD's gzip.
1755 +
1756 +        Bump MBSD minor revision.
1757 +
1758 + 20070313:
1759 +        Imported OpenSSH 4.6p1.
1760 +
1761 +        Imported FreeBSD's libarchive and updated tar to work with it.
1762 +
1763 +        Disabled debug statements cluttering up /var/log/messages for
1764 +        the tcp autobuf patch applied previously.
1765 +
1766 + 20070312:
1767 +        Synced several audio changes from FreeBSD 6.1. Removed the
1768 +        BSD Daemon files from src/share.  
1769 +
1770 + 20070308:
1771 +        Added mfi which supports LSI Logic MegaRAID SAS devices including
1772 +        the Dell perc5i.
1773 +
1774 + 20070206:
1775 +        Imported OpenBSD's sudo into source. Please install
1776 +        /usr/src/usr.bin/sudo/lib first before building.
1777 +
1778 +        Those who install from a snapshot after this date
1779 +        will not be effected.
1780 +
1781 + 20070119:
1782 +        Added audit group.  Be sure to add audit to your /etc/group file
1783 +        before installing world.
1784 +
1785 +        hostapd was updated to 0.4.8.
1786 +
1787 +        An accidental commit in usr.sbin/bluetooth/hccontrol was fixed to
1788 +        unbreak world.
1789 +
1790 +        wpa_supplicant was updated.
1791 +
1792 +        For stability and compatibility reasons, it was decided that MidnightBSD
1793 +        sync with FreeBSD 6.1 Release.  Nearly every change between the original
1794 +        fork date of February 24, 2006 and the release of FreeBSD 6.1 in May
1795 +        2006 will be merged.  Beyond this, MidnightBSD will be a "real" fork and
1796 +        will not sync every little change with FreeBSD.
1797 +
1798 + 20061231:
1799 +        Updated COPYRIGHT for 2007.
1800 +
1801 +        Updated and bumped libutil after importing NetBSD efun(3) functions.
1802 +
1803 +        Added MidnightBSD_version and bumped the FreeBSD version as we've
1804 +        synced all commits between the fork and that version.  It is now safe
1805 +        to assume MidnightBSD is compatible with FreeBSD RELENG_6 from
1806 +        Feb 26, 2006.
1807 +
1808 +        Added spell(1) and deroff(1) from NetBSD.  Also added additional
1809 +        dict files to work with it. /usr/share/dict/american,
1810 +        /usr/share/dict/british and /usr/share/dict/special/math
1811 +
1812 +        Numerous man page and bug fixes.
1813 +
1814 + 20061226:
1815 +        Setup /usr/share/examples/cvsup SUPfiles for the new
1816 +        MidnightBSD CVSup server.
1817 +
1818 +        Fix a bug in burncd where it would continue forever while
1819 +        erasing CDRW media.
1820 +
1821 +        Add csup to /usr/bin.  csup is a CVSup replacement written
1822 +        in C.
1823 +
1824 +        Fixed a bug with bsnmpd build from Oct 30.  
1825 +
1826 +        Corrected some race conditions and fixed a few bugs in
1827 +        geom.  Imported changes from FreeBSD RELENG_6.
1828 +
1829 + 20061225:
1830 +        Fixed a typo in src/lib/libc/sparc64/fpu/fpu_implode.c
1831 +        that caused long double to long and long long
1832 +        conversion of negative numbers to always result in -1.
1833 +
1834 + 20061221:
1835 +        Fixed acpi_battery.c to not report an ERROR if no
1836 +        batteries are present.
1837 +
1838 +        Performed some minor updates on the RL and RE NIC drivers.
1839 +        RL should no longer panic when trying to print errors.
1840 +
1841 +        Corrected a bug with TTY.
1842 +
1843 + 20061218:
1844 +        Corrected a bug with libpthread where newly created suspended
1845 +        threads don't get scheduled.
1846 +
1847 + 20061206:
1848 +        Fixed a typo with the firewire security patch.
1849 +
1850 + 20061129:
1851 +        Minor cleanups to utilities in bin.
1852 +
1853 +        Fixed msdos file system short file name behavior to match
1854 +        FreeBSD.
1855 +
1856 + 20061031:
1857 +        Updated man pages in section 7.
1858 +
1859 + 20061030:
1860 +        Updated sys/dev/drm to support intel 915 and radeon
1861 +        r300 cards properly.  
1862 +
1863 +        Synced snmpd with FreeBSD-stable.
1864 +
1865 +        Fixed a bug in rm which could cause data loss.  
1866 +
1867   20061027:
1868          Added Intel ICH8 and nForce 5 support to ATA. cam, mpt,
1869          random, kbdmux, atkbd, and usb were updated.  Changes
# Line 217 | Line 2078 | Contact Warner Losh if you have any questions about yo
2078   this document.
2079  
2080   $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
2081 < $MidnightBSD: src/UPDATING,v 1.4 2006/10/15 00:11:58 laffer1 Exp $
2081 > $MidnightBSD$

Comparing trunk/UPDATING (property cvs2svn:cvs-rev):
Revision 305 by laffer1, Sat Oct 28 06:15:57 2006 UTC vs.
Revision 9569 by laffer1, Tue Sep 19 01:26:26 2017 UTC

# Line 1 | Line 0
1 1.5

Comparing trunk/UPDATING (property svn:keywords):
Revision 305 by laffer1, Sat Oct 28 06:15:57 2006 UTC vs.
Revision 9569 by laffer1, Tue Sep 19 01:26:26 2017 UTC

# Line 0 | Line 1
1 + MidnightBSD=%H

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines