ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
(Generate patch)

Comparing trunk/UPDATING (file contents):
Revision 5729 by laffer1, Sat Jan 26 01:24:49 2013 UTC vs.
Revision 6898 by laffer1, Tue Oct 28 11:55:52 2014 UTC

# Line 1 | Line 1
1   Updating Information for MidnightBSD users.
2  
3 + 20141028:
4 +        OpenSSL 0.9.8zc
5 +
6 + 20141021:
7 +        Fix several security vulnerabilities in routed, rtsold,
8 +        and namei with respect to Capsicum sandboxes looking up
9 +        nonexistent path names and leaking memory.
10 +
11 +        The input path in routed(8) will accept queries from any source and
12 +        attempt to answer them.  However, the output path assumes that the
13 +        destination address for the response is on a directly connected
14 +        network.
15 +
16 +        Due to a missing length check in the code that handles DNS parameters,
17 +        a malformed router advertisement message can result in a stack buffer
18 +        overflow in rtsold(8).
19 +
20 + 20141011:
21 +        mksh R50d - fix field splitting regression and null
22 +        pointer dereference
23 +
24 +        xz 5.0.7
25 +
26 +        OpenSSH 6.6p1
27 +
28 + 20141004:
29 +        mksh R50c - security update for environment var bug with
30 +        foo vs foo+    
31 +
32 + 20141002:
33 +        sqlite 3.8.6
34 +
35 +        sudo 1.7.8 - some issues with the current version, but we're slowly
36 +        getting up to date.
37 +
38 + 20141001:
39 +        mksh R50b
40 +
41 +        libmport now supports plist commands @dir, @owner, @group, @mode.
42 +
43 +        sudo 1.7.6p2
44 +
45 + 20140916:
46 +        Fix a security issue with TCP SYN.
47 +
48 +        When a segment with the SYN flag for an already existing connection arrives,
49 +        the TCP stack tears down the connection, bypassing a check that the
50 +        sequence number in the segment is in the expected window.
51 +
52 + 20140909:
53 +        Fixed a bug with our clearenv(3) implementation that caused segfaults
54 +        with some programs including Dovecot.
55 +
56 +        OpenSSL security patch:
57 +
58 +        The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
59 +        to consume large amounts of memory. [CVE-2014-3506]
60 +
61 +        The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
62 +        memory. [CVE-2014-3507]
63 +
64 +        A flaw in OBJ_obj2txt may cause pretty printing functions such as
65 +        X509_name_oneline, X509_name_print_ex et al. to leak some information from
66 +        the stack. [CVE-2014-3508]
67 +
68 +        OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
69 +        a denial of service attack. [CVE-2014-3510]
70 +
71 + 20140902:
72 +        We're now 0.6-CURRENT
73 +
74 +        Update USB quirks to support K70 Corsair keyboard, and several
75 +        other devices.
76 +
77 + 20140827:
78 +        Perl 5.18.2
79 +
80 + 20140728:
81 +        Jails now run shutdown scripts.
82 +
83 + 20140710:
84 +        Fix a vulnerability in the control message API. A buffer is not properly cleared
85 +        before sharing with userland.
86 +
87 + 20140701:
88 +        MKSH R50
89 +
90 + 20140630:
91 +        File 5.19
92 +
93 + 20140605:
94 +        Fix four security issues with OpenSSL
95 +
96 + 20140604:
97 +        Sendmail failed to properly set close-on-exec for open file descriptors.
98 +
99 +        ktrace page fault kernel trace entries were set to an incorrect size which resulted
100 +        in a leak of information.
101 +
102 + 20140430:
103 +        Fix a TCP reassembly bug that could result in a DOS attack
104 +        of the system. It may be possible to obtain portions
105 +        of kernel memory as well.
106 +
107 + 20140411:
108 +        Update zlib to 1.2.7
109 +
110 + 20140122:
111 +        Support for username with length 32. Previous limit was 16
112 +
113 + 20140114:
114 +        Fix two security vulnerabilities.
115 +
116 +        bsnmpd contains a stack overflow when sent certain queries.
117 +
118 +        bind 9.8 when using NSEC3-signed zones zones, will crash with special
119 +        crafted packets.
120 +
121 + 20131228:
122 +        Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
123 +
124 +        Updated em(4), igb(4) and ixgbe(4)
125 +
126 +        MidnightBSD now works with Z87 Intel chipsets.
127 +
128 + 20131207:
129 +        Remove sparc64 architecture. It hasn't been working for awhile
130 +        and it's not useful for desktops anymore.
131 +
132 + 20131205:
133 +        OpenSSH 6.4p1
134 +
135 + 20131203:
136 +        Perl 5.18.1 imported.
137 +
138 +        Update less to v458
139 +
140 + 20131130:
141 +        Remove named from base. We still include the client utilities for
142 +        now until replacements can be found.
143 +
144 + 20131004:
145 +        rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
146 +
147 + 20130917:
148 +        Support for 65,536 routing tables was added.  A new fib specific
149 +        field has been added to mbuf.  This is an increase from 16.
150 +
151 + 20130910:
152 +        Security updates: (kern.osreldate 5001)
153 +
154 +        nullfs(5)
155 +
156 +        The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
157 +        check whether the source and target of the link are both in the same
158 +        nullfs instance.  It is therefore possible to create a hardlink from a
159 +        location in one nullfs instance to a file in another, as long as the
160 +        underlying (source) filesystem is the same.
161 +
162 +        ifioctl
163 +
164 +        As is commonly the case, the IPv6 and ATM network layer ioctl request
165 +        handlers are written in such a way that an unrecognized request is
166 +        passed on unmodified to the link layer, which will either handle it or
167 +        return an error code.
168 +
169 +        Network interface drivers, however, assume that the SIOCSIFADDR,
170 +        SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
171 +        handled at the network layer, and therefore do not perform input
172 +        validation or verify the caller's credentials.  Typical link-layer
173 +        actions for these requests may include marking the interface as "up"
174 +        and resetting the underlying hardware.
175 +
176 + 20130824:
177 +        Fix a bug in sendmail 8.14.7 that interferes with how it
178 +        handles AAAA records interoperating with Microsoft DNS servers.
179 +        FreeBSD has already reported this to Sendmail and a fix
180 +        will be included in the next release.
181 +
182 +        Subversion 1.8.1 is now in the base system as a static
183 +        binary.  It has limited functionality, but can be used to
184 +        checkout/commit code.  It is named svnlite.
185 +
186 + 20130822:
187 +        Fix two security vulnerabilities.
188 +
189 +        Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
190 +        This could be exploited to read memory by a user process.
191 +
192 +        When initializing the SCTP state cookie being sent in INIT-ACK chunks,
193 +        a buffer allocated from the kernel stack is not completely initialized.
194 +
195 +        Import xz 5.0.4
196 +
197 +        Import sqlite 3.7.17
198 +
199 +        Import BIND 9.8.5-P2
200 +
201 + 20130814:
202 +        mksh R48 imported.
203 +
204 +        Sendmail 8.14.7 imported.
205 +
206 + 20130717:
207 +        libmport bug was fixed causing hash verification to fail.
208 +
209 +        virtio(4) imported from FreeBSD 9-stable. SCSI support not
210 +        included.
211 +
212 + 20130612:
213 +        RELENG_0_4 created for 0.4. Development continues on 0.5.
214 +
215 + 20130402:
216 +        Update BIND and OpenSSL to resolve security advisories.
217 +
218 + 20130305:
219 +        MKSH R44 imported.
220 +
221 + 20130213:
222 +        MKSH R42b imported
223 +
224 + 20130211:
225 +        MKSH R42 imported
226 +
227   20130125:
228          MKSH R41 imported
229  
# Line 1226 | Line 1450 | Contact Warner Losh if you have any questions about yo
1450   this document.
1451  
1452   $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
1453 < $MidnightBSD: src/UPDATING,v 1.165 2013/01/23 02:35:12 laffer1 Exp $
1453 > $MidnightBSD$

Comparing trunk/UPDATING (property cvs2svn:cvs-rev):
Revision 5729 by laffer1, Sat Jan 26 01:24:49 2013 UTC vs.
Revision 6898 by laffer1, Tue Oct 28 11:55:52 2014 UTC

# Line 1 | Line 0
1 1.166

Comparing trunk/UPDATING (property svn:keywords):
Revision 5729 by laffer1, Sat Jan 26 01:24:49 2013 UTC vs.
Revision 6898 by laffer1, Tue Oct 28 11:55:52 2014 UTC

# Line 0 | Line 1
1 + MidnightBSD=%H

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines