-
Notifications
You must be signed in to change notification settings - Fork 0
/
UPDATING
2200 lines (1550 loc) · 63.4 KB
/
UPDATING
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Updating Information for MidnightBSD users.
20181223:
Import Perl 5.28.0
20181130:
ICMP Buffer underwrite fix
20181109:
Add the ability to disable TRIM on specific controllers or drives
that have bugs.
20181021:
Update ACPICA to 20161117
Update ACPICA to 20160930
20181002:
Stable 1.0 branch created. Continuing development on 1.1
Reintroduce groff and reconnect to build. Removal causes issue with perl ports
and we don't quite have things aligned to get rid of this yet.
20180912:
ELF header security issue
Insufficient validation was performed in the ELF header parser, and malformed
or otherwise invalid ELF binaries were not rejected as they should be.
20180911:
Add support for Corsair K70 LUX keyboard.
20180815:
When using WPA2, EAPOL-Key frames with the Encrypted flag and without the MIC
flag set, the data field was decrypted first without verifying the MIC. When
the dta field was encrypted using RC4, for example, when negotiating TKIP as
a pairwise cipher, the unauthenticated but decrypted data was subsequently
processed. This opened wpa_supplicant(8) to abuse by decryption and recovery
of sensitive information contained in EAPOL-Key messages.
See https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
for a detailed description of the bug.
20180720:
Pull in r211155 from upstream llvm trunk (by Tim Northover):
DAG: move sret demotion into most basic LowerCallTo implementation.
It looks like there are two versions of LowerCallTo here: the
SelectionDAGBuilder one is designed to operate on LLVM IR, and the
TargetLowering one in the case where everything is at DAG level.
Previously, only the SelectionDAGBuilder variant could handle
demoting an impossible return to sret semantics (before delegating to
the TargetLowering version), but this functionality is also useful
for certain libcalls (e.g. 128-bit operations on 32-bit x86). So
this commit moves the sret handling down a level.
This should fix "Call result #3 has unhandled type i32" errors when
building devel/libslang2 for i386.
Add support for AMD X370 and X399 chipsets.
Add support for Intel 8th gen chipsets.
20180719:
Add the AMD B350 Ryzen (300 series) AHCI and XHCI controllers
20180715:
Support wake on lan for Intel gigabit nics in Ice Lake and Cannon Lake devices.
Fix some man page issues
Fix some compatibility and locking issues with NFS client/srver
Loosely eqiuvalent to FreeBSD 10 stable 334699 (june 6)
20180708:
Expat 2.2.0
20180704:
Import FreeBSD 10 stable features from SVN revision 334154
less 530
tcsh 6.20
libc-vis 2017/4/30 (netbsd)
20180120:
gperf 3.0.3
20180119:
mandoc 1.14.3
20171222:
zlib 1.2.11
LLVM / Clang 3.4.1
20171123:
mport now supports installing multiple packages with one command.
binutils updated/synced with FreeBSD 11-stable (today)
20171022:
wpa_supplicant & hostapd 2.0. This also includes patches for the
recent KRACK vulnerability.
20171003:
SQLite 3.20.1
20171001:
Subversion 1.8.17
Perl 5.26.0
Change 0.10 version to 1.0. There are several compatibility issues
with using 0.10 as the trailing zero is dropped in several utilities
making it look like 0.1.
20170918:
Introduce nvme(4) and nvd(4) from FreeBSD.
Fix build of boot code and rescue.
20170819:
Heimdal KDC-REP service name validation vulerability patched.
Introduce a partial fix for AMD Ryzen issues. On Ryzen, move
the lower shared page by one.
20170326:
sudo removed from base. Use doas(1) or install sudo from mports
Stable 0.9 created, continue development on 0.10
20170305:
Add hast module to bsnmpd
20170302:
add a callback to the ada(4) driver so that it knows when
GEOM has released references to it.
20170219:
Add /dev/full device.
The lindev device has been removed since /dev/full has been made a
standard device.
Serf 1.3.9
Subversion 1.8.10
apr 1.5.2
apr-util 1.5.4
20170129:
add doas utility from OpenBSD.
20161105:
BIND 9.9.9-p4
OpenSSH 7.3p1
20161103:
OpenSSL security patch
Due to improper handling of alert packets, OpenSSL would consume an excessive
amount of CPU time processing undefined alert messages.
20161015:
libarchive 3.2.1
xz 5.2.2
20161013:
Sync ZFS code with Illuminos/FreeBSD 9.2. Added support for
feature flags, pool version 5000. This also includes some
bug fixes and performance optimizations.
20160925:
Import NetBSD vis(3) and unvis(3) as well as mtree.
one-true-awk 20121220
inetd now honors kern.ipc.somaxconn value.
netmap synced with FreeBSD 9.2
linuxolator now has dtrace probes.
bsdgrep now correctly handles -m to exclude only one file.
UFS file systems can now be resized in read-write mode due to the new
write suspension feature.
Basic support added for Intel Raid Recover Technology.
GMIRROR & GRAID3 now mark volumes clean on shutdown earlier to help with ZFS issues.
Highpoint hpt27xx now in GENERIC kernel.
20160923:
Security update for OpenSSL
A malicious client can send an excessively large OCSP Status Request extension.
If that client continually requests renegotiation, sending a large OCSP Status
Request extension each time, then there will be unbounded memory growth on the
server. [CVE-2016-6304]
An overflow can occur in MDC2_Update() either if called directly or through
the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
very large amounts of input data after a previous call to EVP_EncryptUpdate()
with a partial block then a length check can overflow resulting in a heap
corruption. [CVE-2016-6303]
If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
DoS attack where a malformed ticket will result in an OOB read which will
ultimately crash. [CVE-2016-6302]
The function BN_bn2dec() does not check the return value of BN_div_word().
This can cause an OOB write if an application uses this function with an
overly large BIGNUM. This could be a problem if an overly large certificate
or CRL is printed out from an untrusted source. TLS is not affected because
record limits will reject an oversized certificate before it is parsed.
[CVE-2016-2182]
The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
the total length the OID text representation would use and not the amount
of data written. This will result in OOB reads when large OIDs are presented.
[CVE-2016-2180]
Some calculations of limits in OpenSSL have used undefined pointer arithmetic.
This could cause problems with some malloc implementations. [CVE-2016-2177]
Operations in the DSA signing algorithm should run in constant time in order to
avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
In a DTLS connection where handshake messages are delivered out-of-order those
messages that OpenSSL is not yet ready to process will be buffered for later
use. Under certain circumstances, a flaw in the logic means that those messages
do not get removed from the buffer even though the handshake has been completed.
An attacker could force up to approx. 15 messages to remain in the buffer when
they are no longer required. These messages will be cleared when the DTLS
connection is closed. The default maximum size for a message is 100k. Therefore
the attacker could force an additional 1500k to be consumed per connection.
[CVE-2016-2179]
A flaw in the DTLS replay attack protection mechanism means that records that
arrive for future epochs update the replay protection "window" before the MAC
for the record has been validated. This could be exploited by an attacker by
sending a record for the next epoch (which does not have to decrypt or have a
valid MAC), with a very large sequence number. This means that all subsequent
legitimate packets are dropped causing a denial of service for a specific
DTLS connection. [CVE-2016-2181]
In OpenSSL 1.0.2 and earlier some missing message length checks can result in
OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
DoS risk but this has not been observed in practice on common platforms.
[CVE-2016-6306]
20160918:
With the addition of auditdistd(8), a new auditdistd user is now
depended on during installworld. "mergemaster -p" can be used to add
the user prior to installworld.
The VFS KBI was changed with the merge of several nullfs
optimizations and fixes. All filesystem modules must be
recompiled.
20160916:
The random(4) support for the VIA hardware random number
generator (`PADLOCK') is no longer enabled unconditionally.
Add the PADLOCK_RNG option in the custom kernel config if
needed. The GENERIC kernels on i386 and amd64 do include the
option, so the change only affects the custom kernel
configurations.
A new version of ZFS (pool version 5000) has been merged.
Starting with this version the old system of ZFS pool versioning
is superseded by "feature flags". This concept enables forward
compatibility against certain future changes in functionality of ZFS
pools. The first two read-only compatible "feature flags" for ZFS
pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
For more information read the new zpool-features(7) manual page.
Please refer to the "ZFS notes" section of this file for information
on upgrading boot ZFS pools.
20160906:
Add support for the MosChip MCS9904 four serial ports
controller.
Add support for walltimestamp in DTrace.
Various gdb improvments.
ZFS
Import the zio nop-write improvement from Illumos. To reduce I/O,
nop-write omits overwriting data if the checksum (cryptographically
secure) of new data matches the checksum of existing data.
It also saves space if snapshots are in use.
It currently works only on datasets with enabled compression, disabled
deduplication and sha256 checksums.
Add loader(8) tunable to enable/disable nopwrite functionality:
vfs.zfs.nopwrite_enabled
Introduce a new dataset aclmode setting "restricted" to protect ACL's
being destroyed or corrupted by a drive-by chmod.
New loader-only tunables:
vfs.zfs.sync_pass_deferred_free
vfs.zfs.sync_pass_dont_compress
vfs.zfs.sync_pass_rewrite
chkgrp(8) add support for q flag
Fix problem with the Samsung 840 PRO series SSD detection.
The device reports support for SATA Asynchronous Notification in its
IDENTIFY data, but returns error on attempt to enable that feature.
Make SATA XPT of CAM only report these errors, but not fail the device.
20160905:
Add a resource limit for the total number of kqueues
available to the user. Kqueue now saves the ucred of the
allocating thread, to correctly decrement the counter on close.
Based on FreeBSD SVN 256849
Import netcat from OpenBSD 5.2
20160904:
Introduced experimental TCP sysctls starting with
net.inet.tcp.experimental.initcwnd10
20160814:
switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
in the release after the fact.
tzdata 2016a
20160811:
libdispatch 210
Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
added WD Red drives.
Updated list of pci device vendors.
Updated list of usb devices.
20160807:
Implement several changes to libmport to fix some memory corruption issues.
20160806:
sqlite3 3.13.0
20160805:
Merged fixes for libmport that improve error handling when installing packages. Also
support mkdir -p like behavior for plist entries.
20160531:
Fix four security issues with MidnightBSD.
The implementation of TIOCGSERIAL ioctl(2) does not clear the output
struct before sending to userland in the linux emulation layer.
The compat 43 stat(2) system call exposes kernel stack to userland.
libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
cpio directory traversal and an integer signedness error in the archive
write zip data routine.
20160528:
Fixed minor issues with mined(1) and msearch(1).
20160526:
Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
Fix libpmc(3) build with clang compiler.
20160519:
Kernel Security updates
atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
local user to overwrite a portion of the kernel memory.
Incorrect argument handling in sendmsg(2)
Incorrect argument handling in the socket code allows malicious local
user to overwrite large portion of the kernel memory.
20160505:
OpenSSL security patch
The padding check in AES-NI CBC MAC was rewritten to be in constant time
by making sure that always the same bytes are read and compared against
either the MAC or padding bytes. But it no longer checked that there was
enough data to have both the MAC and padding bytes. [CVE-2016-2107]
An overflow can occur in the EVP_EncodeUpdate() function which is used for
Base64 encoding of binary data. [CVE-2016-2105]
An overflow can occur in the EVP_EncryptUpdate() function, however it is
believed that there can be no overflows in internal code due to this problem.
[CVE-2016-2106]
When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
a short invalid encoding can casuse allocation of large amounts of memory
potentially consuming excessive resources or exhausting memory.
[CVE-2016-2109]
20160412:
0.8 stable branch created. Continue development as 0.9.
Fix several issues with wait6 system call addition.
20160409:
libmport now supports two new plist formats:
@(root,wheel,4775) myfile
@dir(root,wheel,775) mydir
On delete, absoluate paths are now handled properly.
20160317:
OpenSSH doesn't have the luck of the Irish.
Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
run shell commands on the call to xauth.
Incorrect argument validation in sysarch(2)
A special combination of sysarch(2) arguments, specify a request to
uninstall a set of descriptors from the LDT. The start descriptor
is cleared and the number of descriptors are provided. Due to invalid
use of a signed intermediate value in the bounds checking during argument
validity verification, unbound zero'ing of the process LDT and adjacent
memory can be initiated from usermode.
Patch obtained from FreeBSD.
20160229:
top now displays information on ZFS arc cache.
20160228:
llvm + clang 3.3 is now the default compiler in MidnightBSD.
20160222:
Introduce pipe2 to linux emulation layer.
20160114:
OpenSSL
The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. [CVE-2015-3194]
When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
memory. [CVE-2015-3195]
If PSK identity hints are received by a multi-threaded client then the values
are incorrectly updated in the parent SSL_CTX structure. [CVE-2015-3196]
Fix security on bsnmpd configuration file during installation.
TCP MD5 signature denial of service
A programming error in processing a TCP connection with both TCP_MD5SIG
and TCP_NOOPT socket options may lead to kernel crash.
SCTP
A lack of proper input checks in the ICMPv6 processing in the SCTP stack
can lead to either a failed kernel assertion or to a NULL pointer
dereference. In either case, a kernel panic will follow.
20160102:
Happy New Year
20151101:
Increase kern.ipc.somaxconn default to 256.
20151017:
Add initial statistics api to libmport and a driver to print
it in mport(1).
20151002:
Revised rpcbind(8) patch to fix issues with NIS
20150930:
In rpcbind(8), netbuf structures are copied directly, which would result in
two netbuf structures that reference to one shared address buffer. When one
of the two netbuf structures is freed, access to the other netbuf structure
would result in an undefined result that may crash the rpcbind(8) daemon.
20150926:
libmport now supports @preexec, @postexec, @preunexec and @postunexec
to replace @exec and @unexec.
pre exec runs afer pre-install scripts but before actual installation
post exec runs after install but before post install scripts and
pkg message.
pre unexec runs before pre uninstall scripts
post unexec runs before de-install scripts and after file removal.
20150917:
Fix kqueue write events for files > 2GB
20150825:
kernel:
fix a security issue on amd64 where the GS segment CPU register can be changed via
userland value in kernel mode by using an IRET with #SS or #NP exceptions.
openssh:
A programming error in the privileged monitor process of the sshd(8)
service may allow the username of an already-authenticated user to be
overwritten by the unprivileged child process.
A use-after-free error in the privileged monitor process of he sshd(8)
service may be deterministically triggered by the actions of a
compromised unprivileged child process.
A use-after-free error in the session multiplexing code in the sshd(8)
service may result in unintended termination of the connection.
20150818:
expat security fix
20150815:
libc changes:
setmode(3) now returns errno consistently on error.
libc will compile without error using clang
20150814:
wait6 system call added.
date(1) now handles non numeric numbers passed to -r
like GNU coreutils for improved compatibility.
20150811:
ata(4) AMD Hudson2 SATA controller support.
Intel lynxpoint SATA.
Fix some const warnings when building several device drivers
with llvm/clang.
Sync cas(4) with FreeBSD 9-stable.
Fix some minor issues with ath(4).
20150809:
xz 5.0.8
20150808:
libmport now logs installation and removal of packages to syslog.
20150805:
routed - fix a potential security issue where traffic from outside
the network can disrupt routing.
bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
to run.
20150802:
jansson 2.7 library added. (libjansson is a JSON library in C)
20150728:
Heimdal 1.5.2 (kerberos implementation)
OpenSSL 1.0.1o
cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
TCP Resassemly resource exhaustion bug:
There is a mistake with the introduction of VNET, which converted the
global limit on the number of segments that could belong to reassembly
queues into a per-VNET limit. Because mbufs are allocated from a
global pool, in the presence of a sufficient number of VNETs, the
total number of mbufs attached to reassembly queues can grow to the
total number of mbufs in the system, at which point all network
traffic would cease.
Obtained from: FreeBSD 8
OpenSSH
Fix two security vulnerabilities:
OpenSSH clients does not correctly verify DNS SSHFP records when a server
offers a certificate. [CVE-2014-2653]
OpenSSH servers which are configured to allow password authentication
using PAM (default) would allow many password attempts. A bug allows
MaxAuthTries to be bypassed. [CVE-2015-5600]
Switch to bsdpatch (from FreeBSD & OpenBSD)
20150726:
BSD Sort updated
sqlite 3.8.10.2
20150725:
Import reallocarray from OpenBSD's libc.
The reallocarray() function is similar to realloc() except it operates on
nmemb members of size size and checks for integer overflow in the
calculation nmemb * size.
20150722:
Fix a bug where TCP connections transitioning to LAST_ACK
state can get stuck. This can result in a denial of service.
20150715:
libmport now supports @shell and @sample in plists. This means that
a shell port can automatically add an entry to /etc/shells and remove
it upon uninstallation. For sample files, a copy is made without the
.sample extension if one does not exist and it is removed automatically
only if the md5 hash of the two files is the same.
20150709:
flex 2.5.39
20150702:
ZFS in MidnightBSD now supports lz4 compression. You can enable it
with zfs set compression=lz4 pool/path.
Verify it's working with
zfs get compressratio pool/path
du -h -s *
Note you must write new data when turning on compression to see
changes. Existing files are not compressed.
Note: While we used the same basic implementation of lz4 that
FreeBSD and OpenZFS uses, we did not yet implement features support
and the zfs version still reports 28. This may come in a future update
to ZFS.
20150621:
libmport now automatically stops services when deleting packages.
The package must have installed an rc.d script in /usr/local/etc
for this to work. This is equivalent to running service <name> onestop
20150618:
Sendmail
With the recent changes to OpenSSL to block 512 bit certificates,
sendmail can't connect with TLS to some servers.
Increase the default size to 1024 bit for client connections to
match the server configuration.
ZFS
Added ZFS TRIM support which is enabled by default. To disable
ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
Creating new ZFS pools and adding new devices to existing pools
first performs a full device level TRIM which can take a significant
amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
to disable this behaviour.
ZFS TRIM requires the underlying device support BIO_DELETE which
is currently provided by methods such as ATA TRIM and SCSI UNMAP
via CAM, which are typically supported by SSD's.
Stats for ZFS TRIM can be monitored by looking at the sysctl's
under kstat.zfs.misc.zio_trim.
rc.d
Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
implies everything is mounted and ready to go.
Changed how ip6addressctl maps IPv6 on startup.
20150613:
tzdata 2015d
20150612:
OpenSSL 0.9.8zg
20150419:
MidnightBSD 0.6 stable branch created. Continue 0.7
development.
20150418:
sqlite 3.8.9
20150407:
Fix two security vulnerabilities:
The previous fix for IGMP had an overflow issue. This has been corrected.
ipv6: The Neighbor Discover Protocol allows a local router to advertise a
suggested Current Hop Limit value of a link, which will replace
Current Hop Limit on an interface connected to the link on the MidnightBSD
system.
20150319:
OpenSSL 0.9.8.zf
mksh R50e
Apple mDNSResponder 561.1.1
20150306:
Upgrade OpenSSL to 0.9.8ze
20150225:
Fix two security vulnerabilities.
1. BIND servers which are configured to perform DNSSEC validation and which
are using managed keys (which occurs implicitly when using
"dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
unpredictable behavior due to the use of an improperly initialized
variable.
CVE-2015-1349
2. An integer overflow in computing the size of IGMPv3 data buffer can result
in a buffer which is too small for the requested operation.
This can result in a DOS attack.
20141211:
Fix a security issue with file and libmagic that can allow
an attacker to create a denial of service attack on any
program that uses libmagic.
20141109:
Fix building perl during buildworld when the GDBM port is installed.
20141106:
tzdata 2014i
20141102:
serf 1.3.8
20141031:
tnftp 20141031 fixes a security vulnerability with tnftp,
CVE-2014-8517.
20141028:
OpenSSL 0.9.8zc
20141021:
Fix several security vulnerabilities in routed, rtsold,
and namei with respect to Capsicum sandboxes looking up
nonexistent path names and leaking memory.
The input path in routed(8) will accept queries from any source and
attempt to answer them. However, the output path assumes that the
destination address for the response is on a directly connected
network.
Due to a missing length check in the code that handles DNS parameters,
a malformed router advertisement message can result in a stack buffer
overflow in rtsold(8).
20141011:
mksh R50d - fix field splitting regression and null
pointer dereference
xz 5.0.7
OpenSSH 6.6p1
20141004:
mksh R50c - security update for environment var bug with
foo vs foo+
20141002:
sqlite 3.8.6
sudo 1.7.8 - some issues with the current version, but we're slowly
getting up to date.
20141001:
mksh R50b
libmport now supports plist commands @dir, @owner, @group, @mode.
sudo 1.7.6p2
20140916:
Fix a security issue with TCP SYN.
When a segment with the SYN flag for an already existing connection arrives,
the TCP stack tears down the connection, bypassing a check that the
sequence number in the segment is in the expected window.
20140909:
Fixed a bug with our clearenv(3) implementation that caused segfaults
with some programs including Dovecot.
OpenSSL security patch:
The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
to consume large amounts of memory. [CVE-2014-3506]
The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
memory. [CVE-2014-3507]
A flaw in OBJ_obj2txt may cause pretty printing functions such as
X509_name_oneline, X509_name_print_ex et al. to leak some information from
the stack. [CVE-2014-3508]
OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
a denial of service attack. [CVE-2014-3510]
20140902:
We're now 0.6-CURRENT
Update USB quirks to support K70 Corsair keyboard, and several
other devices.
20140827:
Perl 5.18.2
20140728:
Jails now run shutdown scripts.
20140710:
Fix a vulnerability in the control message API. A buffer is not properly cleared
before sharing with userland.
20140701:
MKSH R50
20140630:
File 5.19
20140605:
Fix four security issues with OpenSSL
20140604:
Sendmail failed to properly set close-on-exec for open file descriptors.
ktrace page fault kernel trace entries were set to an incorrect size which resulted
in a leak of information.
20140430:
Fix a TCP reassembly bug that could result in a DOS attack
of the system. It may be possible to obtain portions
of kernel memory as well.
20140411:
Update zlib to 1.2.7
20140122:
Support for username with length 32. Previous limit was 16
20140114:
Fix two security vulnerabilities.
bsnmpd contains a stack overflow when sent certain queries.
bind 9.8 when using NSEC3-signed zones zones, will crash with special
crafted packets.
20131228:
Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
Updated em(4), igb(4) and ixgbe(4)
MidnightBSD now works with Z87 Intel chipsets.
20131207:
Remove sparc64 architecture. It hasn't been working for awhile
and it's not useful for desktops anymore.
20131205:
OpenSSH 6.4p1
20131203:
Perl 5.18.1 imported.
Update less to v458
20131130:
Remove named from base. We still include the client utilities for
now until replacements can be found.
20131004:
rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
20130917:
Support for 65,536 routing tables was added. A new fib specific
field has been added to mbuf. This is an increase from 16.
20130910:
Security updates: (kern.osreldate 5001)
nullfs(5)
The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
check whether the source and target of the link are both in the same
nullfs instance. It is therefore possible to create a hardlink from a
location in one nullfs instance to a file in another, as long as the
underlying (source) filesystem is the same.
ifioctl
As is commonly the case, the IPv6 and ATM network layer ioctl request
handlers are written in such a way that an unrecognized request is
passed on unmodified to the link layer, which will either handle it or
return an error code.
Network interface drivers, however, assume that the SIOCSIFADDR,
SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
handled at the network layer, and therefore do not perform input
validation or verify the caller's credentials. Typical link-layer
actions for these requests may include marking the interface as "up"
and resetting the underlying hardware.
20130824:
Fix a bug in sendmail 8.14.7 that interferes with how it
handles AAAA records interoperating with Microsoft DNS servers.
FreeBSD has already reported this to Sendmail and a fix
will be included in the next release.
Subversion 1.8.1 is now in the base system as a static
binary. It has limited functionality, but can be used to
checkout/commit code. It is named svnlite.
20130822:
Fix two security vulnerabilities.
Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
This could be exploited to read memory by a user process.
When initializing the SCTP state cookie being sent in INIT-ACK chunks,
a buffer allocated from the kernel stack is not completely initialized.
Import xz 5.0.4
Import sqlite 3.7.17
Import BIND 9.8.5-P2
20130814:
mksh R48 imported.
Sendmail 8.14.7 imported.
20130717:
libmport bug was fixed causing hash verification to fail.
virtio(4) imported from FreeBSD 9-stable. SCSI support not
included.
20130612:
RELENG_0_4 created for 0.4. Development continues on 0.5.
20130402:
Update BIND and OpenSSL to resolve security advisories.
20130305:
MKSH R44 imported.
20130213:
MKSH R42b imported
20130211:
MKSH R42 imported
20130125:
MKSH R41 imported
20130122:
OpenSSH 5.8p2 imported
SQLite 3.7.15.2 imported
Fixed a longstanding bug in libmport extrating new index files.
20120710:
BSD licensed sort imported from FreeBSD-CURRENT
For now, GNU sort is installed as gnusort, but it will
go away in time.
20120708:
tcsh 6.18.01 imported.
NetBSD's iconv imported.
libc gains strnlen(3), memrchr(3), stpncpy(3).
20120612:
BIND security update related to CVE-2012-1667.
Zero length resource records can cause BIND to crash resulting