ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 6983 by laffer1, Fri Mar 20 00:53:47 2015 UTC vs.
Revision 7782 by laffer1, Mon Sep 5 16:20:48 2016 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20160905:
4 +        Add a resource limit for the total number of kqueues
5 +        available to the user. Kqueue now saves the ucred of the
6 +        allocating thread, to correctly decrement the counter on close.
7 +        Based on FreeBSD SVN 256849
8 +
9 + 20160814:
10 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
11 +        in the release after the fact.
12 +
13 +        tzdata 2016a
14 +
15 + 20160811:
16 +        libdispatch 210
17 +
18 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
19 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
20 +        added WD Red drives.
21 +
22 +        Updated list of pci device vendors.
23 +
24 +        Updated list of usb devices.
25 +
26 + 20160807:
27 +        Implement several changes to libmport to fix some memory corruption issues.
28 +
29 + 20160806:
30 +        sqlite3 3.13.0
31 +
32 + 20160805:
33 +        Merged fixes for libmport that improve error handling when installing packages. Also
34 +        support mkdir -p like behavior for plist entries.
35 +
36 + 20160531:
37 +        Fix four security issues with MidnightBSD.
38 +
39 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
40 +        struct before sending to userland in the linux emulation layer.
41 +
42 +        The compat 43 stat(2) system call exposes kernel stack to userland.
43 +
44 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
45 +        cpio directory traversal and an integer signedness error in the archive
46 +        write zip data routine.
47 +
48 +
49 + 20160528:
50 +        Fixed minor issues with mined(1) and msearch(1).
51 +
52 + 20160526:
53 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
54 +
55 +        Fix libpmc(3) build with clang compiler.
56 +
57 + 20160519:
58 +        Kernel Security updates
59 +
60 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
61 +        local user to overwrite a portion of the kernel memory.
62 +
63 +        Incorrect argument handling in sendmsg(2)
64 +
65 +        Incorrect argument handling in the socket code allows malicious local
66 +        user to overwrite large portion of the kernel memory.
67 +
68 + 20160505:
69 +        OpenSSL security patch
70 +
71 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
72 +        by making sure that always the same bytes are read and compared against
73 +        either the MAC or padding bytes. But it no longer checked that there was
74 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
75 +
76 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
77 +        Base64 encoding of binary data. [CVE-2016-2105]
78 +
79 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
80 +        believed that there can be no overflows in internal code due to this problem.
81 +        [CVE-2016-2106]
82 +
83 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
84 +        a short invalid encoding can casuse allocation of large amounts of memory
85 +        potentially consuming excessive resources or exhausting memory.
86 +        [CVE-2016-2109]
87 +
88 + 20160412:
89 +        0.8 stable branch created. Continue development as 0.9.
90 +
91 +        Fix several issues with wait6 system call addition.
92 +
93 + 20160409:
94 +        libmport now supports two new plist formats:
95 +        @(root,wheel,4775) myfile
96 +        @dir(root,wheel,775) mydir
97 +
98 +        On delete, absoluate paths are now handled properly.
99 +
100 + 20160317:
101 +        OpenSSH doesn't have the luck of the Irish.
102 +
103 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
104 +        run shell commands on the call to xauth.
105 +
106 +        Incorrect argument validation in sysarch(2)
107 +
108 +        A special combination of sysarch(2) arguments, specify a request to
109 +        uninstall a set of descriptors from the LDT.  The start descriptor
110 +        is cleared and the number of descriptors are provided.  Due to invalid
111 +        use of a signed intermediate value in the bounds checking during argument
112 +        validity verification, unbound zero'ing of the process LDT and adjacent
113 +        memory can be initiated from usermode.
114 +
115 +        Patch obtained from FreeBSD.
116 +
117 + 20160229:
118 +        top now displays information on ZFS arc cache.
119 +
120 + 20160228:
121 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
122 +
123 + 20160222:
124 +        Introduce pipe2 to linux emulation layer.
125 +
126 + 20160114:
127 +        OpenSSL
128 +
129 +        The signature verification routines will crash with a NULL pointer dereference
130 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
131 +        mask generation function parameter. [CVE-2015-3194]
132 +
133 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
134 +        memory. [CVE-2015-3195]
135 +
136 +        If PSK identity hints are received by a multi-threaded client then the values
137 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
138 +
139 +        Fix security on bsnmpd configuration file during installation.
140 +
141 +        TCP MD5 signature denial of service
142 +
143 +        A programming error in processing a TCP connection with both TCP_MD5SIG
144 +        and TCP_NOOPT socket options may lead to kernel crash.
145 +
146 +        SCTP
147 +
148 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
149 +        can lead to either a failed kernel assertion or to a NULL pointer
150 +        dereference.  In either case, a kernel panic will follow.
151 +
152 + 20160102:
153 +        Happy New Year
154 +
155 + 20151101:
156 +        Increase kern.ipc.somaxconn default to 256.
157 +
158 + 20151017:
159 +        Add initial statistics api to libmport and a driver to print
160 +        it in mport(1).
161 +
162 + 20151002:
163 +        Revised rpcbind(8) patch to fix issues with NIS
164 +
165 + 20150930:
166 +        In rpcbind(8), netbuf structures are copied directly, which would result in
167 +        two netbuf structures that reference to one shared address buffer.  When one
168 +        of the two netbuf structures is freed, access to the other netbuf structure
169 +        would result in an undefined result that may crash the rpcbind(8) daemon.
170 +
171 + 20150926:
172 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
173 +        to replace @exec and @unexec.  
174 +
175 +        pre exec runs afer pre-install scripts but before actual installation
176 +
177 +        post exec runs after install but before post install scripts and
178 +        pkg message.
179 +
180 +        pre unexec runs before pre uninstall scripts
181 +
182 +        post unexec runs before de-install scripts and after file removal.
183 +
184 + 20150917:
185 +        Fix kqueue write events for files > 2GB
186 +
187 + 20150825:
188 +        kernel:
189 +        fix a security issue on amd64 where the GS segment CPU register can be changed via
190 +        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
191 +
192 +        openssh:
193 +        A programming error in the privileged monitor process of the sshd(8)
194 +        service may allow the username of an already-authenticated user to be
195 +        overwritten by the unprivileged child process.
196 +
197 +        A use-after-free error in the privileged monitor process of he sshd(8)
198 +        service may be deterministically triggered by the actions of a
199 +        compromised unprivileged child process.
200 +
201 +        A use-after-free error in the session multiplexing code in the sshd(8)
202 +        service may result in unintended termination of the connection.
203 +
204 + 20150818:
205 +        expat security fix
206 +
207 + 20150815:
208 +        libc changes:
209 +        setmode(3) now returns errno consistently on error.
210 +        libc will compile without error using clang
211 +
212 + 20150814:
213 +        wait6 system call added.
214 +
215 +        date(1) now handles non numeric numbers passed to -r
216 +        like GNU coreutils for improved compatibility.
217 +
218 + 20150811:
219 +        ata(4) AMD Hudson2 SATA controller support.
220 +        Intel lynxpoint SATA.
221 +
222 +        Fix some const warnings when building several device drivers
223 +        with llvm/clang.
224 +
225 +        Sync cas(4) with FreeBSD 9-stable.
226 +
227 +        Fix some minor issues with ath(4).
228 +
229 + 20150809:
230 +        xz 5.0.8
231 +
232 + 20150808:
233 +        libmport now logs installation and removal of packages to syslog.
234 +
235 + 20150805:
236 +        routed - fix a potential security issue where traffic from outside
237 +        the network can disrupt routing.
238 +
239 +        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
240 +        to run.
241 +
242 + 20150802:
243 +        jansson 2.7 library added. (libjansson is a JSON library in C)
244 +
245 + 20150728:
246 +        Heimdal 1.5.2 (kerberos implementation)
247 +
248 +        OpenSSL 1.0.1o
249 +
250 +        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
251 +
252 +        TCP Resassemly resource exhaustion bug:
253 +        There is a mistake with the introduction of VNET, which converted the
254 +        global limit on the number of segments that could belong to reassembly
255 +        queues into a per-VNET limit.  Because mbufs are allocated from a
256 +        global pool, in the presence of a sufficient number of VNETs, the
257 +        total number of mbufs attached to reassembly queues can grow to the
258 +        total number of mbufs in the system, at which point all network
259 +        traffic would cease.
260 +        Obtained from: FreeBSD 8
261 +
262 +        OpenSSH
263 +
264 +        Fix two security vulnerabilities:
265 +        OpenSSH clients does not correctly verify DNS SSHFP records when a server
266 +        offers a certificate. [CVE-2014-2653]
267 +
268 +        OpenSSH servers which are configured to allow password authentication
269 +        using PAM (default) would allow many password attempts. A bug allows
270 +        MaxAuthTries to be bypassed. [CVE-2015-5600]
271 +
272 +
273 +        Switch to bsdpatch (from FreeBSD & OpenBSD)
274 +
275 + 20150726:
276 +        BSD Sort updated
277 +
278 +        sqlite 3.8.10.2
279 +
280 + 20150725:
281 +        Import reallocarray from OpenBSD's libc.  
282 +
283 +        The reallocarray() function is similar to realloc() except it operates on
284 +        nmemb members of size size and checks for integer overflow in the
285 +        calculation nmemb * size.
286 +
287 + 20150722:
288 +        Fix a bug where TCP connections transitioning to LAST_ACK
289 +        state can get stuck. This can result in a denial of service.
290 +
291 + 20150715:
292 +        libmport now supports @shell and @sample in plists. This means that
293 +        a shell port can automatically add an entry to /etc/shells and remove
294 +        it upon uninstallation. For sample files, a copy is made without the
295 +        .sample extension if one does not exist and it is removed automatically
296 +        only if the md5 hash of the two files is the same.
297 +
298 + 20150709:
299 +        flex 2.5.39
300 +
301 + 20150702:
302 +        ZFS in MidnightBSD now supports lz4 compression. You can enable it
303 +        with zfs set compression=lz4 pool/path.
304 +
305 +        Verify it's working with
306 +        zfs get compressratio pool/path
307 +        du -h -s *
308 +
309 +        Note you must write new data when turning on compression to see
310 +        changes. Existing files are not compressed.
311 +
312 +        Note: While we used the same basic implementation of lz4 that
313 +        FreeBSD and OpenZFS uses, we did not yet implement features support
314 +        and the zfs version still reports 28. This may come in a future update
315 +        to ZFS.
316 +
317 + 20150621:
318 +        libmport now automatically stops services when deleting packages.
319 +
320 +        The package must have installed an rc.d script in /usr/local/etc
321 +        for this to work. This is equivalent to running service <name> onestop
322 +
323 + 20150618:
324 +        Sendmail
325 +
326 +        With the recent changes to OpenSSL to block 512 bit certificates,
327 +        sendmail can't connect with TLS to some servers.
328 +
329 +        Increase the default size to 1024 bit for client connections to
330 +        match the server configuration.
331 +
332 +        ZFS
333 +
334 +        Added ZFS TRIM support which is enabled by default. To disable
335 +        ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
336 +
337 +        Creating new ZFS pools and adding new devices to existing pools
338 +        first performs a full device level TRIM which can take a significant
339 +        amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
340 +        to disable this behaviour.
341 +
342 +        ZFS TRIM requires the underlying device support BIO_DELETE which
343 +        is currently provided by methods such as ATA TRIM and SCSI UNMAP
344 +        via CAM, which are typically supported by SSD's.
345 +
346 +        Stats for ZFS TRIM can be monitored by looking at the sysctl's
347 +        under kstat.zfs.misc.zio_trim.
348 +
349 +        rc.d
350 +
351 +        Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
352 +        implies everything is mounted and ready to go.
353 +
354 +        Changed how ip6addressctl maps IPv6 on startup.
355 +
356 + 20150613:
357 +        tzdata 2015d
358 +
359 + 20150612:
360 +        OpenSSL 0.9.8zg
361 +
362 + 20150419:
363 +        MidnightBSD 0.6 stable branch created. Continue 0.7
364 +        development.
365 +
366 + 20150418:
367 +        sqlite 3.8.9
368 +
369 + 20150407:
370 +        Fix two security vulnerabilities:
371 +
372 +        The previous fix for IGMP had an overflow issue. This has been corrected.
373 +
374 +        ipv6: The Neighbor Discover Protocol allows a local router to advertise a
375 +        suggested Current Hop Limit value of a link, which will replace
376 +        Current Hop Limit on an interface connected to the link on the MidnightBSD
377 +        system.
378 +
379   20150319:
380          OpenSSL 0.9.8.zf
381  
382          mksh R50e
383 +
384 +        Apple mDNSResponder 561.1.1
385  
386   20150306:
387          Upgrade OpenSSL to 0.9.8ze

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines