Regen from: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.67

This commit is contained in:
Ken Smith 2004-03-30 18:06:25 +00:00
parent 08c5705137
commit 9376a1d4b4
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=20447

View file

@ -18,8 +18,8 @@ alink="#0000FF">
<p class="COPYRIGHT">Copyright &copy; 2000, 2001, 2002, 2003, 2004 The FreeBSD
Documentation Project</p>
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
2004/03/05 04:19:06 bmah Exp $<br />
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.67
2004/03/30 17:43:26 kensmith Exp $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -92,19 +92,19 @@ target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a>.</p>
<h2 class="SECT1"><a id="SECURITY" name="SECURITY">2 Security Advisories</a></h2>
<p>(30 Jan 2004, updated 28 Feb 2004) A bug in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=mksnap_ffs&amp;sektion=8&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=mksnap_ffs&sektion=8&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">mksnap_ffs</span>(8)</span></a>
causes the creation of a filesystem snapshot to reset the flags on the filesystem to
their default values. The possible consequences depend on local usage, but can include
disabling extended access control lists or enabling the use of setuid executables stored
on an untrusted filesystem. This bug also affects the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=dump&amp;sektion=8&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=dump&sektion=8&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">dump</span>(8)</span></a> <var
class="OPTION">-L</var> option, which uses <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=mksnap_ffs&amp;sektion=8&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=mksnap_ffs&sektion=8&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">mksnap_ffs</span>(8)</span></a>.
Note that <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=mksnap_ffs&amp;sektion=8&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=mksnap_ffs&sektion=8&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">mksnap_ffs</span>(8)</span></a> is
normally only available to the superuser and members of the <tt
class="GROUPNAME">operator</tt> group. This bug has been fixed on the FreeBSD 5.2-RELEASE
@ -115,7 +115,7 @@ target="_top">FreeBSD-SA-04:01</a>.</p>
<p>(8 Feb 2004, updated 28 Feb 2004) A bug with the System V Shared Memory interface
(specifically the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=shmat&amp;sektion=2&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=shmat&sektion=2&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">shmat</span>(2)</span></a> system
call) can cause a shared memory segment to reference unallocated kernel memory. In turn,
this can permit a local attacker to gain unauthorized access to parts of kernel memory,
@ -128,7 +128,7 @@ target="_top">FreeBSD-SA-04:02</a>.</p>
<p>(28 Feb 2004) It is possible, under some circumstances, for a processor with superuser
privileges inside a <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=jail&amp;sektion=8&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=jail&sektion=8&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">jail</span>(8)</span></a>
environment to change its root directory to a different jail, giving it read and write
access to the files and directories within. This vulnerability has been closed on the
@ -146,21 +146,22 @@ href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
patching existing systems.</p>
<p>(17 Mar 2004) By performing a specially crafted SSL/TLS handshake with
an application that uses OpenSSL a null pointer may be dereferenced. This
may in turn cause the application to crash, resulting in a denial of service
attack. For more information see the Security Advisory
<a href="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc"
target="_top">FreeBSD-SA-04:05</a> which contains more details and instructions
on how to patch existing systems.</p>
<p>(17 Mar 2004) By performing a specially crafted SSL/TLS handshake with an application
that uses OpenSSL a null pointer may be dereferenced. This may in turn cause the
application to crash, resulting in a denial of service attack. For more information see
the Security Advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc"
target="_top">FreeBSD-SA-04:05</a> which contains more details and instructions on how to
patch existing systems.</p>
<p>(29 Mar 2004) A local attacker may take advantage of a programming error in the
handling of certain IPv6 socket options in the
<a href="http://www.FreeBSD.org/cgi/man.cgi?query=setsockopt&amp;sektion=2&amp;manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">setsockopt</span>(2)</span></a> system call
to read portions of kernel memory without proper authorization. This may result in disclosure of
sensitive data, or potentially cause a panic. See Security Advisory
<a href="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:06.ipv6.asc"
handling of certain IPv6 socket options in the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=setsockopt&sektion=2&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">setsockopt</span>(2)</span></a>
system call to read portions of kernel memory without proper authorization. This may
result in disclosure of sensitive data, or potentially cause a panic. See Security
Advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:06.ipv6.asc"
target="_top">FreeBSD-SA-04:06</a> for a more detailed description and instructions on
how to patch existing systems.</p>
</div>
@ -170,13 +171,13 @@ how to patch existing systems.</p>
<h2 class="SECT1"><a id="OPEN-ISSUES" name="OPEN-ISSUES">3 Open Issues</a></h2>
<p>(9 Jan 2004) Due to a change in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=cpp&amp;sektion=1&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=cpp&sektion=1&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">cpp</span>(1)</span></a> behavior,
the login screen for <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=xdm&amp;sektion=1&amp;manpath=XFree86+4.3.0">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">xdm</span>(1)</span></a> is in
black and white, even on systems with color displays. As a workaround, update to a newer
version of the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=xdm&sektion=1&manpath=XFree86+4.3.0"><span
class="CITEREFENTRY"><span class="REFENTRYTITLE">xdm</span>(1)</span></a> is in black and
white, even on systems with color displays. As a workaround, update to a newer version of
the <a
href="http://www.FreeBSD.org/cgi/url.cgi?ports/x11/XFree86-4-clients/pkg-descr"><tt
class="FILENAME">x11/XFree86-4-clients</tt></a> port/package.</p>
@ -187,9 +188,9 @@ class="VARNAME">hint.acpi.0.disabled</var> kernel environment variable. These pr
are being investigated. For problems that have not already been reported (check the
mailing list archives <span class="emphasis"><i class="EMPHASIS">before</i></span>
posting), sending the output of <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=dmesg&amp;sektion=8&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=dmesg&sektion=8&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">dmesg</span>(8)</span></a> and <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=acpidump&amp;sektion=8&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=acpidump&sektion=8&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">acpidump</span>(8)</span></a> to
the <a href="http://lists.FreeBSD.org/mailman/listinfo/freebsd-current"
target="_top">FreeBSD-CURRENT mailing list</a> may help diagnose the problem.</p>
@ -218,26 +219,26 @@ the <var class="VARNAME">hint.acpi.0.disabled</var> kernel environment variable.
<p>Some of these problems were addressed in FreeBSD 5.2.1-RELEASE with the import of a
newer <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=ata&amp;sektion=4&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=ata&sektion=4&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">ata</span>(4)</span></a> from
5.2-CURRENT.</p>
<p>(9 Jan 2004) Installing over NFS when using the install floppies requires that the <tt
class="FILENAME">nfsclient.ko</tt> module be manually loaded from the third floppy disk.
This can be done by following the prompts when <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=sysinstall&amp;sektion=8&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=sysinstall&sektion=8&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">sysinstall</span>(8)</span></a>
launches to load a driver off of the third floppy disk.</p>
<p>(9 Jan 2004) The use of multiple vchans (virtual audio channels with dynamic mixing in
software) in the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=pcm&amp;sektion=4&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=pcm&sektion=4&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">pcm</span>(4)</span></a> driver
has been known to cause some instability.</p>
<p>(10 Jan 2004) Although APIC interrupt routing seems to work correctly on many systems,
on some others (such as some laptops) it can cause various errors, such as <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=ata&amp;sektion=4&amp;manpath=FreeBSD+5.2-current">
href="http://www.FreeBSD.org/cgi/man.cgi?query=ata&sektion=4&manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">ata</span>(4)</span></a> errors or
hangs when starting or exiting X11. For these situations, it may be advisable to disable
APIC routing, using the ``safe mode'' of the bootloader or the <var