ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 7168 by laffer1, Sun Jul 26 18:22:27 2015 UTC vs.
Revision 11368 by laffer1, Fri Jul 6 12:52:43 2018 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 < 20160726:
3 > 20180704:
4 >        Import FreeBSD 10 stable features from SVN revision 334154
5 >
6 >        less 530
7 >
8 >        tcsh 6.20
9 >
10 >        libc-vis 2017/4/30 (netbsd)
11 >
12 > 20180120:
13 >        gperf 3.0.3
14 >
15 > 20180119:
16 >        mandoc 1.14.3
17 >
18 > 20171222:
19 >        zlib 1.2.11
20 >
21 >        LLVM / Clang 3.4.1
22 >
23 > 20171123:
24 >        mport now supports installing multiple packages with one command.
25 >
26 >        binutils updated/synced with FreeBSD 11-stable (today)
27 >
28 > 20171022:
29 >        wpa_supplicant & hostapd 2.0. This also includes patches for the
30 >        recent KRACK vulnerability.
31 >
32 > 20171003:
33 >        SQLite 3.20.1
34 >
35 > 20171001:
36 >        Subversion 1.8.17
37 >
38 >        Perl 5.26.0
39 >
40 >        Change 0.10 version to 1.0. There are several compatibility issues
41 >        with using 0.10 as the trailing zero is dropped in several utilities
42 >        making it look like 0.1.
43 >
44 > 20170918:
45 >        Introduce nvme(4) and nvd(4) from FreeBSD.
46 >
47 >        Fix build of boot code and rescue.
48 >
49 > 20170819:
50 >        Heimdal KDC-REP service name validation vulerability patched.
51 >
52 >        Introduce a partial fix for AMD Ryzen issues. On Ryzen, move
53 >        the lower shared page by one.
54 >
55 > 20170326:
56 >        sudo removed from base. Use doas(1) or install sudo from mports
57 >
58 >        Stable 0.9 created, continue development on 0.10
59 >
60 > 20170305:
61 >        Add hast module to bsnmpd
62 >
63 > 20170302:
64 >        add a callback to the ada(4) driver so that it knows when
65 >        GEOM has released references to it.
66 >
67 > 20170219:
68 >        Add /dev/full device.
69 >
70 >        The lindev device has been removed since /dev/full has been made a
71 >        standard device.
72 >
73 >        Serf 1.3.9
74 >        Subversion 1.8.10
75 >        apr 1.5.2
76 >        apr-util 1.5.4
77 >
78 > 20170129:
79 >        add doas utility from OpenBSD.
80 >
81 > 20161105:
82 >        BIND 9.9.9-p4
83 >
84 >        OpenSSH 7.3p1
85 >
86 > 20161103:
87 >        OpenSSL security patch
88 >
89 >        Due to improper handling of alert packets, OpenSSL would consume an excessive
90 >        amount of CPU time processing undefined alert messages.
91 >
92 > 20161015:
93 >        libarchive 3.2.1
94 >
95 >        xz 5.2.2
96 >
97 > 20161013:
98 >        Sync ZFS code with Illuminos/FreeBSD 9.2. Added support for
99 >        feature flags, pool version 5000. This also includes some
100 >        bug fixes and performance optimizations.
101 >
102 > 20160925:
103 >        Import NetBSD vis(3) and unvis(3) as well as mtree.
104 >
105 >        one-true-awk 20121220
106 >
107 >        inetd now honors kern.ipc.somaxconn value.
108 >
109 >        netmap synced with FreeBSD 9.2
110 >
111 >        linuxolator now has dtrace probes.
112 >
113 >        bsdgrep now correctly handles -m to exclude only one file.
114 >
115 >        UFS file systems can now be resized in read-write mode due to the new
116 >        write suspension feature.
117 >
118 >        Basic support added for Intel Raid Recover Technology.
119 >
120 >        GMIRROR & GRAID3 now mark volumes clean on shutdown earlier to help with ZFS issues.
121 >
122 >        Highpoint hpt27xx now in GENERIC kernel.
123 >
124 > 20160923:
125 >        Security update for OpenSSL
126 >
127 >        A malicious client can send an excessively large OCSP Status Request extension.
128 >        If that client continually requests renegotiation, sending a large OCSP Status
129 >        Request extension each time, then there will be unbounded memory growth on the
130 >        server. [CVE-2016-6304]
131 >
132 >        An overflow can occur in MDC2_Update() either if called directly or through
133 >        the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
134 >        very large amounts of input data after a previous call to EVP_EncryptUpdate()
135 >        with a partial block then a length check can overflow resulting in a heap
136 >        corruption. [CVE-2016-6303]
137 >
138 >        If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
139 >        DoS attack where a malformed ticket will result in an OOB read which will
140 >        ultimately crash. [CVE-2016-6302]
141 >
142 >        The function BN_bn2dec() does not check the return value of BN_div_word().
143 >        This can cause an OOB write if an application uses this function with an
144 >        overly large BIGNUM. This could be a problem if an overly large certificate
145 >        or CRL is printed out from an untrusted source. TLS is not affected because
146 >        record limits will reject an oversized certificate before it is parsed.
147 >        [CVE-2016-2182]
148 >
149 >        The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
150 >        the total length the OID text representation would use and not the amount
151 >        of data written. This will result in OOB reads when large OIDs are presented.
152 >        [CVE-2016-2180]
153 >
154 >        Some calculations of limits in OpenSSL have used undefined pointer arithmetic.
155 >        This could cause problems with some malloc implementations. [CVE-2016-2177]
156 >
157 >        Operations in the DSA signing algorithm should run in constant time in order to
158 >        avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
159 >        a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
160 >
161 >        In a DTLS connection where handshake messages are delivered out-of-order those
162 >        messages that OpenSSL is not yet ready to process will be buffered for later
163 >        use. Under certain circumstances, a flaw in the logic means that those messages
164 >        do not get removed from the buffer even though the handshake has been completed.
165 >        An attacker could force up to approx. 15 messages to remain in the buffer when
166 >        they are no longer required. These messages will be cleared when the DTLS
167 >        connection is closed. The default maximum size for a message is 100k. Therefore
168 >        the attacker could force an additional 1500k to be consumed per connection.
169 >        [CVE-2016-2179]
170 >
171 >        A flaw in the DTLS replay attack protection mechanism means that records that
172 >        arrive for future epochs update the replay protection "window" before the MAC
173 >        for the record has been validated. This could be exploited by an attacker by
174 >        sending a record for the next epoch (which does not have to decrypt or have a
175 >        valid MAC), with a very large sequence number. This means that all subsequent
176 >        legitimate packets are dropped causing a denial of service for a specific
177 >        DTLS connection. [CVE-2016-2181]
178 >
179 >        In OpenSSL 1.0.2 and earlier some missing message length checks can result in
180 >        OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
181 >        DoS risk but this has not been observed in practice on common platforms.
182 >        [CVE-2016-6306]
183 >
184 > 20160918:
185 >        With the addition of auditdistd(8), a new auditdistd user is now
186 >        depended on during installworld.  "mergemaster -p" can be used to add
187 >        the user prior to installworld.
188 >
189 >        The VFS KBI was changed with the merge of several nullfs
190 >        optimizations and fixes.  All filesystem modules must be
191 >        recompiled.
192 >
193 > 20160916:
194 >        The random(4) support for the VIA hardware random number
195 >        generator (`PADLOCK') is no longer enabled unconditionally.
196 >        Add the PADLOCK_RNG option in the custom kernel config if
197 >        needed.  The GENERIC kernels on i386 and amd64 do include the
198 >        option, so the change only affects the custom kernel
199 >        configurations.
200 >
201 >        A new version of ZFS (pool version 5000) has been merged.
202 >        Starting with this version the old system of ZFS pool versioning
203 >        is superseded by "feature flags". This concept enables forward
204 >        compatibility against certain future changes in functionality of ZFS
205 >        pools. The first two read-only compatible "feature flags" for ZFS
206 >        pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
207 >        For more information read the new zpool-features(7) manual page.
208 >        Please refer to the "ZFS notes" section of this file for information
209 >        on upgrading boot ZFS pools.
210 >
211 > 20160906:
212 >        Add support for the MosChip MCS9904 four serial ports
213 >        controller.
214 >
215 >        Add support for walltimestamp in DTrace.
216 >
217 >        Various gdb improvments.
218 >
219 >        ZFS
220 >        Import the zio nop-write improvement from Illumos. To reduce I/O,
221 >        nop-write omits overwriting data if the checksum (cryptographically
222 >        secure) of new data matches the checksum of existing data.
223 >        It also saves space if snapshots are in use.
224 >
225 >        It currently works only on datasets with enabled compression, disabled
226 >        deduplication and sha256 checksums.
227 >
228 >        Add loader(8) tunable to enable/disable nopwrite functionality:
229 >        vfs.zfs.nopwrite_enabled
230 >
231 >        Introduce a new dataset aclmode setting "restricted" to protect ACL's
232 >        being destroyed or corrupted by a drive-by chmod.
233 >
234 >        New loader-only tunables:
235 >        vfs.zfs.sync_pass_deferred_free
236 >        vfs.zfs.sync_pass_dont_compress
237 >        vfs.zfs.sync_pass_rewrite
238 >
239 >        chkgrp(8) add support for q flag
240 >
241 >        Fix problem with the Samsung 840 PRO series SSD detection.
242 >        The device reports support for SATA Asynchronous Notification in its
243 >        IDENTIFY data, but returns error on attempt to enable that feature.
244 >        Make SATA XPT of CAM only report these errors, but not fail the device.
245 >
246 > 20160905:
247 >        Add a resource limit for the total number of kqueues
248 >        available to the user. Kqueue now saves the ucred of the
249 >        allocating thread, to correctly decrement the counter on close.
250 >        Based on FreeBSD SVN 256849
251 >
252 >        Import netcat from OpenBSD 5.2
253 >
254 > 20160904:
255 >        Introduced experimental TCP sysctls starting with
256 >        net.inet.tcp.experimental.initcwnd10
257 >
258 > 20160814:
259 >        switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
260 >        in the release after the fact.
261 >
262 >        tzdata 2016a
263 >
264 > 20160811:
265 >        libdispatch 210
266 >
267 >        Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
268 >        Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
269 >        added WD Red drives.
270 >
271 >        Updated list of pci device vendors.
272 >
273 >        Updated list of usb devices.
274 >
275 > 20160807:
276 >        Implement several changes to libmport to fix some memory corruption issues.
277 >
278 > 20160806:
279 >        sqlite3 3.13.0
280 >
281 > 20160805:
282 >        Merged fixes for libmport that improve error handling when installing packages. Also
283 >        support mkdir -p like behavior for plist entries.
284 >
285 > 20160531:
286 >        Fix four security issues with MidnightBSD.
287 >
288 >        The implementation of TIOCGSERIAL ioctl(2) does not clear the output
289 >        struct before sending to userland in the linux emulation layer.
290 >
291 >        The compat 43 stat(2) system call exposes kernel stack to userland.
292 >
293 >        libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
294 >        cpio directory traversal and an integer signedness error in the archive
295 >        write zip data routine.
296 >
297 >
298 > 20160528:
299 >        Fixed minor issues with mined(1) and msearch(1).
300 >
301 > 20160526:
302 >        Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
303 >
304 >        Fix libpmc(3) build with clang compiler.
305 >
306 > 20160519:
307 >        Kernel Security updates
308 >
309 >        atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
310 >        local user to overwrite a portion of the kernel memory.
311 >
312 >        Incorrect argument handling in sendmsg(2)
313 >
314 >        Incorrect argument handling in the socket code allows malicious local
315 >        user to overwrite large portion of the kernel memory.
316 >
317 > 20160505:
318 >        OpenSSL security patch
319 >
320 >        The padding check in AES-NI CBC MAC was rewritten to be in constant time
321 >        by making sure that always the same bytes are read and compared against
322 >        either the MAC or padding bytes. But it no longer checked that there was
323 >        enough data to have both the MAC and padding bytes. [CVE-2016-2107]
324 >
325 >        An overflow can occur in the EVP_EncodeUpdate() function which is used for
326 >        Base64 encoding of binary data. [CVE-2016-2105]
327 >
328 >        An overflow can occur in the EVP_EncryptUpdate() function, however it is
329 >        believed that there can be no overflows in internal code due to this problem.
330 >        [CVE-2016-2106]
331 >
332 >        When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
333 >        a short invalid encoding can casuse allocation of large amounts of memory
334 >        potentially consuming excessive resources or exhausting memory.
335 >        [CVE-2016-2109]
336 >
337 > 20160412:
338 >        0.8 stable branch created. Continue development as 0.9.
339 >
340 >        Fix several issues with wait6 system call addition.
341 >
342 > 20160409:
343 >        libmport now supports two new plist formats:
344 >        @(root,wheel,4775) myfile
345 >        @dir(root,wheel,775) mydir
346 >
347 >        On delete, absoluate paths are now handled properly.
348 >
349 > 20160317:
350 >        OpenSSH doesn't have the luck of the Irish.
351 >
352 >        Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
353 >        run shell commands on the call to xauth.
354 >
355 >        Incorrect argument validation in sysarch(2)
356 >
357 >        A special combination of sysarch(2) arguments, specify a request to
358 >        uninstall a set of descriptors from the LDT.  The start descriptor
359 >        is cleared and the number of descriptors are provided.  Due to invalid
360 >        use of a signed intermediate value in the bounds checking during argument
361 >        validity verification, unbound zero'ing of the process LDT and adjacent
362 >        memory can be initiated from usermode.
363 >
364 >        Patch obtained from FreeBSD.
365 >
366 > 20160229:
367 >        top now displays information on ZFS arc cache.
368 >
369 > 20160228:
370 >        llvm + clang 3.3 is now the default compiler in MidnightBSD.
371 >
372 > 20160222:
373 >        Introduce pipe2 to linux emulation layer.
374 >
375 > 20160114:
376 >        OpenSSL
377 >
378 >        The signature verification routines will crash with a NULL pointer dereference
379 >        if presented with an ASN.1 signature using the RSA PSS algorithm and absent
380 >        mask generation function parameter. [CVE-2015-3194]
381 >
382 >        When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
383 >        memory. [CVE-2015-3195]
384 >
385 >        If PSK identity hints are received by a multi-threaded client then the values
386 >        are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
387 >
388 >        Fix security on bsnmpd configuration file during installation.
389 >
390 >        TCP MD5 signature denial of service
391 >
392 >        A programming error in processing a TCP connection with both TCP_MD5SIG
393 >        and TCP_NOOPT socket options may lead to kernel crash.
394 >
395 >        SCTP
396 >
397 >        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
398 >        can lead to either a failed kernel assertion or to a NULL pointer
399 >        dereference.  In either case, a kernel panic will follow.
400 >
401 > 20160102:
402 >        Happy New Year
403 >
404 > 20151101:
405 >        Increase kern.ipc.somaxconn default to 256.
406 >
407 > 20151017:
408 >        Add initial statistics api to libmport and a driver to print
409 >        it in mport(1).
410 >
411 > 20151002:
412 >        Revised rpcbind(8) patch to fix issues with NIS
413 >
414 > 20150930:
415 >        In rpcbind(8), netbuf structures are copied directly, which would result in
416 >        two netbuf structures that reference to one shared address buffer.  When one
417 >        of the two netbuf structures is freed, access to the other netbuf structure
418 >        would result in an undefined result that may crash the rpcbind(8) daemon.
419 >
420 > 20150926:
421 >        libmport now supports @preexec, @postexec, @preunexec and @postunexec
422 >        to replace @exec and @unexec.  
423 >
424 >        pre exec runs afer pre-install scripts but before actual installation
425 >
426 >        post exec runs after install but before post install scripts and
427 >        pkg message.
428 >
429 >        pre unexec runs before pre uninstall scripts
430 >
431 >        post unexec runs before de-install scripts and after file removal.
432 >
433 > 20150917:
434 >        Fix kqueue write events for files > 2GB
435 >
436 > 20150825:
437 >        kernel:
438 >        fix a security issue on amd64 where the GS segment CPU register can be changed via
439 >        userland value in kernel mode by using an IRET with #SS or #NP exceptions.
440 >
441 >        openssh:
442 >        A programming error in the privileged monitor process of the sshd(8)
443 >        service may allow the username of an already-authenticated user to be
444 >        overwritten by the unprivileged child process.
445 >
446 >        A use-after-free error in the privileged monitor process of he sshd(8)
447 >        service may be deterministically triggered by the actions of a
448 >        compromised unprivileged child process.
449 >
450 >        A use-after-free error in the session multiplexing code in the sshd(8)
451 >        service may result in unintended termination of the connection.
452 >
453 > 20150818:
454 >        expat security fix
455 >
456 > 20150815:
457 >        libc changes:
458 >        setmode(3) now returns errno consistently on error.
459 >        libc will compile without error using clang
460 >
461 > 20150814:
462 >        wait6 system call added.
463 >
464 >        date(1) now handles non numeric numbers passed to -r
465 >        like GNU coreutils for improved compatibility.
466 >
467 > 20150811:
468 >        ata(4) AMD Hudson2 SATA controller support.
469 >        Intel lynxpoint SATA.
470 >
471 >        Fix some const warnings when building several device drivers
472 >        with llvm/clang.
473 >
474 >        Sync cas(4) with FreeBSD 9-stable.
475 >
476 >        Fix some minor issues with ath(4).
477 >
478 > 20150809:
479 >        xz 5.0.8
480 >
481 > 20150808:
482 >        libmport now logs installation and removal of packages to syslog.
483 >
484 > 20150805:
485 >        routed - fix a potential security issue where traffic from outside
486 >        the network can disrupt routing.
487 >
488 >        bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
489 >        to run.
490 >
491 > 20150802:
492 >        jansson 2.7 library added. (libjansson is a JSON library in C)
493 >
494 > 20150728:
495 >        Heimdal 1.5.2 (kerberos implementation)
496 >
497 >        OpenSSL 1.0.1o
498 >
499 >        cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
500 >
501 >        TCP Resassemly resource exhaustion bug:
502 >        There is a mistake with the introduction of VNET, which converted the
503 >        global limit on the number of segments that could belong to reassembly
504 >        queues into a per-VNET limit.  Because mbufs are allocated from a
505 >        global pool, in the presence of a sufficient number of VNETs, the
506 >        total number of mbufs attached to reassembly queues can grow to the
507 >        total number of mbufs in the system, at which point all network
508 >        traffic would cease.
509 >        Obtained from: FreeBSD 8
510 >
511 >        OpenSSH
512 >
513 >        Fix two security vulnerabilities:
514 >        OpenSSH clients does not correctly verify DNS SSHFP records when a server
515 >        offers a certificate. [CVE-2014-2653]
516 >
517 >        OpenSSH servers which are configured to allow password authentication
518 >        using PAM (default) would allow many password attempts. A bug allows
519 >        MaxAuthTries to be bypassed. [CVE-2015-5600]
520 >
521 >
522 >        Switch to bsdpatch (from FreeBSD & OpenBSD)
523 >
524 > 20150726:
525          BSD Sort updated
526  
527          sqlite 3.8.10.2
528  
529 < 20160725:
529 > 20150725:
530          Import reallocarray from OpenBSD's libc.  
531  
532          The reallocarray() function is similar to realloc() except it operates on

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines