ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 7306 by laffer1, Thu Sep 17 12:47:34 2015 UTC vs.
Revision 7581 by laffer1, Fri May 27 03:42:17 2016 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20160526:
4 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
5 +
6 +        Fix libpmc(3) build with clang compiler.
7 +
8 + 20160519:
9 +        Kernel Security updates
10 +
11 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
12 +        local user to overwrite a portion of the kernel memory.
13 +
14 +        Incorrect argument handling in sendmsg(2)
15 +
16 +        Incorrect argument handling in the socket code allows malicious local
17 +        user to overwrite large portion of the kernel memory.
18 +
19 + 20160505:
20 +        OpenSSL security patch
21 +
22 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
23 +        by making sure that always the same bytes are read and compared against
24 +        either the MAC or padding bytes. But it no longer checked that there was
25 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
26 +
27 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
28 +        Base64 encoding of binary data. [CVE-2016-2105]
29 +
30 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
31 +        believed that there can be no overflows in internal code due to this problem.
32 +        [CVE-2016-2106]
33 +
34 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
35 +        a short invalid encoding can casuse allocation of large amounts of memory
36 +        potentially consuming excessive resources or exhausting memory.
37 +        [CVE-2016-2109]
38 +
39 + 20160412:
40 +        0.8 stable branch created. Continue development as 0.9.
41 +
42 +        Fix several issues with wait6 system call addition.
43 +
44 + 20160409:
45 +        libmport now supports two new plist formats:
46 +        @(root,wheel,4775) myfile
47 +        @dir(root,wheel,775) mydir
48 +
49 +        On delete, absoluate paths are now handled properly.
50 +
51 + 20160317:
52 +        OpenSSH doesn't have the luck of the Irish.
53 +
54 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
55 +        run shell commands on the call to xauth.
56 +
57 +        Incorrect argument validation in sysarch(2)
58 +
59 +        A special combination of sysarch(2) arguments, specify a request to
60 +        uninstall a set of descriptors from the LDT.  The start descriptor
61 +        is cleared and the number of descriptors are provided.  Due to invalid
62 +        use of a signed intermediate value in the bounds checking during argument
63 +        validity verification, unbound zero'ing of the process LDT and adjacent
64 +        memory can be initiated from usermode.
65 +
66 +        Patch obtained from FreeBSD.
67 +
68 + 20160229:
69 +        top now displays information on ZFS arc cache.
70 +
71 + 20160228:
72 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
73 +
74 + 20160222:
75 +        Introduce pipe2 to linux emulation layer.
76 +
77 + 20160114:
78 +        OpenSSL
79 +
80 +        The signature verification routines will crash with a NULL pointer dereference
81 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
82 +        mask generation function parameter. [CVE-2015-3194]
83 +
84 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
85 +        memory. [CVE-2015-3195]
86 +
87 +        If PSK identity hints are received by a multi-threaded client then the values
88 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
89 +
90 +        Fix security on bsnmpd configuration file during installation.
91 +
92 +        TCP MD5 signature denial of service
93 +
94 +        A programming error in processing a TCP connection with both TCP_MD5SIG
95 +        and TCP_NOOPT socket options may lead to kernel crash.
96 +
97 +        SCTP
98 +
99 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
100 +        can lead to either a failed kernel assertion or to a NULL pointer
101 +        dereference.  In either case, a kernel panic will follow.
102 +
103 + 20160102:
104 +        Happy New Year
105 +
106 + 20151101:
107 +        Increase kern.ipc.somaxconn default to 256.
108 +
109 + 20151017:
110 +        Add initial statistics api to libmport and a driver to print
111 +        it in mport(1).
112 +
113 + 20151002:
114 +        Revised rpcbind(8) patch to fix issues with NIS
115 +
116 + 20150930:
117 +        In rpcbind(8), netbuf structures are copied directly, which would result in
118 +        two netbuf structures that reference to one shared address buffer.  When one
119 +        of the two netbuf structures is freed, access to the other netbuf structure
120 +        would result in an undefined result that may crash the rpcbind(8) daemon.
121 +
122 + 20150926:
123 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
124 +        to replace @exec and @unexec.  
125 +
126 +        pre exec runs afer pre-install scripts but before actual installation
127 +
128 +        post exec runs after install but before post install scripts and
129 +        pkg message.
130 +
131 +        pre unexec runs before pre uninstall scripts
132 +
133 +        post unexec runs before de-install scripts and after file removal.
134 +
135   20150917:
136          Fix kqueue write events for files > 2GB
137  

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines