5:16 PM - German Article
Apparently, we were featured in an article.
http://www.cul.de/data/freex52007inh.pdf
Apparently, we were featured in an article.
http://www.cul.de/data/freex52007inh.pdf
We are proud to announce the first RELEASE of MidnightBSD for 32bit Intel systems. (Intel Pentium, Core, AMD Athlon, etc) .
http://cs.emich.edu/mbsd/releases/i386/ISO-IMAGES/0.1/
(rsyncing right now)
http://www.midnightbsd.org/ftp/MidnightBSD/releases/i386/ISO-IMAGES/0.1/
(official mirror)
Here is a list of issues with the release:
ERRATA
Installation issues
projectcenter.app package is missing dependancies on disc2.
mutt package is missing urlview dependancy on disc2.
GNUstep package includes gdnc which is missing libgcc_s.so.1.
bash 3 and gmake missing libintl.so.6. This can be fixed by uninstalling gettext and building it from the port. The port is not including the shared library for some reason. We are investigating.
System issues
CVSUP example for updating src fetches CURRENT instead of RELENG_0_1
Using Virtual PC for Windows:
If you install MidnightBSD in VPC, you will need to set hint.acpi.0.disabled="1" in /boot/device.hints This will help with the "calcru: negative runtime of" issue.
Seirei has been working on a German translation of the website. It is still a work in progress, but I've linked it in on the first page of the English site. I'll probably work on adding the link on the rest of the site and trying to add the images and movie to the russian site if I get a chance.
http://www.midnightbsd.org/de/
I added some new mailing lists tonight. There is now a users, kernel and cvs list. You can follow ALL cvs commits, discuss issues with midnightbsd on users or talk about kernel issues and development. Actually, the kernel list should be used for more technical questions in the same manner as the DragonFly lists. We're not big enough to warrant having so many lists like FreeBSD. I'm rather new to setting up GNU MailMan so if anything is borked, let me know.
http://www.midnightbsd.org/mailman/listinfo
MidnightBSD currently maintains the FreeBSD osreldate of 601000 as we have most of the patches and elements from 6.1 Release. However, osreldate is a very useful tool to make adjustments between versions in ports. The ports tree relies on OSVERSION values for FreeBSD. All uses of this must be purged before we can switch over to using our own value.
All new ports should not use the value and any existing ports found should remove the dependance on it. I went through the mports tree and cleaned out about half of the uses today. When mports are updated, you may notice a lot of changes. Few ports had any significant functionality change.
Also, we are getting reports that some ports have not been fixed from the mports transition. Please file bug reports or let one of the developers know if a port is broken. Any developers should mark them broken and file a bug report so we can look at them later. If it is an easy fix or you have time, fix it and submit. compat4x is known to be broken. The firefox (native) port is also broken.
MidnightBSD 0.1 and 0.2 (CURRENT) have been patched for the recent vulnerabilities in BIND and Tcpdump.
While we don't have this in mports, it's still of interest. Etoile has released 0.2 as well as a live cd.
http://www.etoile-project.org/
The LiveCD
http://download.gna.org/etoile/etoile-livecd-0.2-build-A2.iso
Please note that Live CD does NOT work on Microsoft Virtual PC 2007 for Windows or Microsoft Virtual PC 7.02 for Mac. It did boot up on my IBM Thinkpad T30. Their Live CD is based on Ubuntu. It uses a username/password combination of etoile/etoile.
I may try to do something with this later in the week. I'm still working with sysinstall in current.
A new 0.1 snapshot is available for MidnightBSD.
http://www.midnightbsd.org/ftp/MidnightBSD/snapshots/i386/0.1-070726-SNAP/0.1-20070726-SNAP-i386-disc1.iso
It is recommended that you download from a mirror instead.
This snapshot continues to use GNU cpio 2.4.2. It does have two outstanding security issues.
1. The recent BIND 9.3.4p1 update is not included in either branch yet.
2. The tcpdump issue has not been patched in 0.1 yet.
This is now the recommended snapshot for a MidnightBSD install. Please report any issues as we are nearing a release on this branch. Packages are missing and aside from the above issues, we need to remove some menu options in sysinstall.
Yesterday, I committed some new files in src/nrelease in CURRENT. cvs update -d your source tree, then do a make buildworld, buildkernel, installkernel, reboot installworld, mergemaster process. This approach works if you're tracking CURRENT.
Now, go into /usr/src/nrelease. Run make buildiso and make mkiso. This will create a new directory /usr/release, install the buildworld into it and then create an ISO.
If you wish to customize the ISO, go into src/nrelease/root. You can add files and tailer files for the CD there.
I've posted two Live CDs on the FTP server. Both are based on MidnightBSD 0.2 CURRENT. You can download a Live CD for i386 or AMD64. The current approach uses acd0 for booting so most elements are mounted read-only. These Live CDs are not intended for installation, although it might be possible to fdisk/bsdlabel the system and copy the contents of the CD with a few changes to /etc/fstab.
Long term I'm hoping to get this working with X11 + GNUstep and create an installer for MidnightBSD.
This is based on the process used to create DragonFly ISOs.
(amd64) http://www.midnightbsd.org/ftp/MidnightBSD/snapshots/amd64/0.2-070720-LIVECD/mbsd.iso
(i386) http://www.midnightbsd.org/ftp/MidnightBSD/snapshots/i386/0.2-070721-LIVECD/mbsd.iso
A buffer overflow issue was discovered in tcpdump which is shipped with MidnightBSD. A patch has been committed to CURRENT (0.2)
http://secunia.com/advisories/26135/
http://www.tcpdump.org/
Some people wonder about MidnightBSD commit activity. Now there is an easy way to follow the action.
http://cia.vc/stats/project/midnightbsd
You can also view commits from many different projects on #commits on freenode.
I just set this up a few minutes ago.
The 0.2 snap does not work. There seems to be a problem with cpio
/stand/cpio malformed number...
ugh. Well I'll be looking at this problem later.
Update: it does appear to be cpio related. http://www.gnu.org/software/cpio/
We inherited libarchive from the FreeBSD project. A security issue effects both FreeBSD and MidnightBSD. We have applied the patch to CURRENT and the 0.1 branch.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:05.libarchive Security Advisory
The FreeBSD Project
Topic: Errors handling corrupt tar files in libarchive(3)
Category: core
Module: libarchive
Announced: 2007-07-12
Credits: CPNI, CERT-FI, Tim Kientzle, Colin Percival
Affects: FreeBSD 5.3 and later.
Corrected: 2007-07-12 15:00:44 UTC (RELENG_6, 6.2-STABLE)
2007-07-12 15:01:14 UTC (RELENG_6_2, 6.2-RELEASE-p6)
2007-07-12 15:01:32 UTC (RELENG_6_1, 6.1-RELEASE-p18)
2007-07-12 15:01:42 UTC (RELENG_5, 5.5-STABLE)
2007-07-12 15:01:56 UTC (RELENG_5_5, 5.5-RELEASE-p14)
CVE Name: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
I. Background
The libarchive library provides a flexible interface for reading and
writing streaming archive files such as tar and cpio, and has been the
basis for FreeBSD's implementation of the tar(1) utility since FreeBSD 5.3.
II. Problem Description
Several problems have been found in the code used to parse the tar and
pax interchange formats. These include entering an infinite loop if an
archive prematurely ends within a pax extension header or if certain
types of corruption occur in pax extension headers [CVE-2007-3644];
dereferencing a NULL pointer if an archive prematurely ends within a
tar header immediately following a pax extension header or if certain
other types of corruption occur in pax extension headers [CVE-2007-3645];
and miscomputing the length of a buffer resulting in a buffer overflow
if yet another type of corruption occurs in a pax extension header
[CVE-2007-3641].
III. Impact
An attacker who can cause a corrupt archive of his choice to be parsed
by libarchive, including by having "tar -x" (extract) or "tar -t" (list
entries) run on it, can cause libarchive to enter an infinite loop, to
core dump, or possibly to execute arbitrary code provided by the
attacker.
IV. Workaround
No workaround is available, but systems which do not read tar or pax
extension archives provided by untrusted sources are not vulnerable.
Note that while these issues do not affect libarchive's ability to
parse cpio, ISO9660, or zip format archives, libarchive automatically
detects the format of an archive, so external metadata (e.g., a file
name) is not sufficient to ensure that a file will not be parsed using
the vulnerable tar/pax format parser.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to 5-STABLE, or 6-STABLE, or to the
RELENG_6_2, RELENG_6_1, or RELENG_5_5 security branch dated after the
correction date.
2) To patch your present system:
The following patches have been verified to apply to FreeBSD 5.5, 6.1,
and 6.2 systems.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch http://security.FreeBSD.org/patches/SA-07:05/libarchive.patch
# fetch http://security.FreeBSD.org/patches/SA-07:05/libarchive.patch.asc
b) Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
# cd /usr/src/lib/libarchive
# make obj && make depend && make && make install
# cd /usr/src/rescue
# make obj && make depend && make && make install
NOTE: On the amd64 platform, the above procedure will not update the
lib32 (i386 compatibility) libraries. On amd64 systems where the i386
compatibility libraries are used, the operating system should instead
be recompiled as described in
VI. Correction details
The following list contains the revision numbers of each file that was
corrected in FreeBSD.
Branch Revision
Path
- -------------------------------------------------------------------------
RELENG_5
src/lib/libarchive/archive_read_support_format_tar.c 1.26.2.8
RELENG_5_5
src/UPDATING 1.342.2.35.2.14
src/sys/conf/newvers.sh 1.62.2.21.2.16
src/lib/libarchive/archive_read_support_format_tar.c 1.26.2.7.2.1
RELENG_6
src/lib/libarchive/archive_read_support_format_tar.c 1.32.2.5
RELENG_6_2
src/UPDATING 1.416.2.29.2.9
src/sys/conf/newvers.sh 1.69.2.13.2.9
src/lib/libarchive/archive_read_support_format_tar.c 1.32.2.2.2.1
RELENG_6_1
src/UPDATING 1.416.2.22.2.20
src/sys/conf/newvers.sh 1.69.2.11.2.20
src/lib/libarchive/archive_read_support_format_tar.c 1.32.6.1
- -------------------------------------------------------------------------
VII. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3641
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3644
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3645
The latest revision of this advisory is available at
http://security.FreeBSD.org/advisories/FreeBSD-SA-07:05.libarchive.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (FreeBSD)
iD4DBQFGlkN5FdaIBMps37IRAl/vAJ4vKkZ9eXBW4PPljvbgALUlAPdxCQCXRMzY
4hKO09Xhj1akwPufFXJS2w==
=sRGA
-----END PGP SIGNATURE-----