ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 7306 by laffer1, Thu Sep 17 12:47:34 2015 UTC vs.
Revision 7782 by laffer1, Mon Sep 5 16:20:48 2016 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20160905:
4 +        Add a resource limit for the total number of kqueues
5 +        available to the user. Kqueue now saves the ucred of the
6 +        allocating thread, to correctly decrement the counter on close.
7 +        Based on FreeBSD SVN 256849
8 +
9 + 20160814:
10 +        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
11 +        in the release after the fact.
12 +
13 +        tzdata 2016a
14 +
15 + 20160811:
16 +        libdispatch 210
17 +
18 +        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
19 +        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
20 +        added WD Red drives.
21 +
22 +        Updated list of pci device vendors.
23 +
24 +        Updated list of usb devices.
25 +
26 + 20160807:
27 +        Implement several changes to libmport to fix some memory corruption issues.
28 +
29 + 20160806:
30 +        sqlite3 3.13.0
31 +
32 + 20160805:
33 +        Merged fixes for libmport that improve error handling when installing packages. Also
34 +        support mkdir -p like behavior for plist entries.
35 +
36 + 20160531:
37 +        Fix four security issues with MidnightBSD.
38 +
39 +        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
40 +        struct before sending to userland in the linux emulation layer.
41 +
42 +        The compat 43 stat(2) system call exposes kernel stack to userland.
43 +
44 +        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
45 +        cpio directory traversal and an integer signedness error in the archive
46 +        write zip data routine.
47 +
48 +
49 + 20160528:
50 +        Fixed minor issues with mined(1) and msearch(1).
51 +
52 + 20160526:
53 +        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
54 +
55 +        Fix libpmc(3) build with clang compiler.
56 +
57 + 20160519:
58 +        Kernel Security updates
59 +
60 +        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
61 +        local user to overwrite a portion of the kernel memory.
62 +
63 +        Incorrect argument handling in sendmsg(2)
64 +
65 +        Incorrect argument handling in the socket code allows malicious local
66 +        user to overwrite large portion of the kernel memory.
67 +
68 + 20160505:
69 +        OpenSSL security patch
70 +
71 +        The padding check in AES-NI CBC MAC was rewritten to be in constant time
72 +        by making sure that always the same bytes are read and compared against
73 +        either the MAC or padding bytes. But it no longer checked that there was
74 +        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
75 +
76 +        An overflow can occur in the EVP_EncodeUpdate() function which is used for
77 +        Base64 encoding of binary data. [CVE-2016-2105]
78 +
79 +        An overflow can occur in the EVP_EncryptUpdate() function, however it is
80 +        believed that there can be no overflows in internal code due to this problem.
81 +        [CVE-2016-2106]
82 +
83 +        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
84 +        a short invalid encoding can casuse allocation of large amounts of memory
85 +        potentially consuming excessive resources or exhausting memory.
86 +        [CVE-2016-2109]
87 +
88 + 20160412:
89 +        0.8 stable branch created. Continue development as 0.9.
90 +
91 +        Fix several issues with wait6 system call addition.
92 +
93 + 20160409:
94 +        libmport now supports two new plist formats:
95 +        @(root,wheel,4775) myfile
96 +        @dir(root,wheel,775) mydir
97 +
98 +        On delete, absoluate paths are now handled properly.
99 +
100 + 20160317:
101 +        OpenSSH doesn't have the luck of the Irish.
102 +
103 +        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
104 +        run shell commands on the call to xauth.
105 +
106 +        Incorrect argument validation in sysarch(2)
107 +
108 +        A special combination of sysarch(2) arguments, specify a request to
109 +        uninstall a set of descriptors from the LDT.  The start descriptor
110 +        is cleared and the number of descriptors are provided.  Due to invalid
111 +        use of a signed intermediate value in the bounds checking during argument
112 +        validity verification, unbound zero'ing of the process LDT and adjacent
113 +        memory can be initiated from usermode.
114 +
115 +        Patch obtained from FreeBSD.
116 +
117 + 20160229:
118 +        top now displays information on ZFS arc cache.
119 +
120 + 20160228:
121 +        llvm + clang 3.3 is now the default compiler in MidnightBSD.
122 +
123 + 20160222:
124 +        Introduce pipe2 to linux emulation layer.
125 +
126 + 20160114:
127 +        OpenSSL
128 +
129 +        The signature verification routines will crash with a NULL pointer dereference
130 +        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
131 +        mask generation function parameter. [CVE-2015-3194]
132 +
133 +        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
134 +        memory. [CVE-2015-3195]
135 +
136 +        If PSK identity hints are received by a multi-threaded client then the values
137 +        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
138 +
139 +        Fix security on bsnmpd configuration file during installation.
140 +
141 +        TCP MD5 signature denial of service
142 +
143 +        A programming error in processing a TCP connection with both TCP_MD5SIG
144 +        and TCP_NOOPT socket options may lead to kernel crash.
145 +
146 +        SCTP
147 +
148 +        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
149 +        can lead to either a failed kernel assertion or to a NULL pointer
150 +        dereference.  In either case, a kernel panic will follow.
151 +
152 + 20160102:
153 +        Happy New Year
154 +
155 + 20151101:
156 +        Increase kern.ipc.somaxconn default to 256.
157 +
158 + 20151017:
159 +        Add initial statistics api to libmport and a driver to print
160 +        it in mport(1).
161 +
162 + 20151002:
163 +        Revised rpcbind(8) patch to fix issues with NIS
164 +
165 + 20150930:
166 +        In rpcbind(8), netbuf structures are copied directly, which would result in
167 +        two netbuf structures that reference to one shared address buffer.  When one
168 +        of the two netbuf structures is freed, access to the other netbuf structure
169 +        would result in an undefined result that may crash the rpcbind(8) daemon.
170 +
171 + 20150926:
172 +        libmport now supports @preexec, @postexec, @preunexec and @postunexec
173 +        to replace @exec and @unexec.  
174 +
175 +        pre exec runs afer pre-install scripts but before actual installation
176 +
177 +        post exec runs after install but before post install scripts and
178 +        pkg message.
179 +
180 +        pre unexec runs before pre uninstall scripts
181 +
182 +        post unexec runs before de-install scripts and after file removal.
183 +
184   20150917:
185          Fix kqueue write events for files > 2GB
186  

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines