diff --git a/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html b/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html index 370b547b00..49cfb2b6ff 100644 --- a/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html +++ b/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html @@ -1,7 +1,7 @@ -FreeBSD 8.4-RELEASE Errata

FreeBSD 8.4-RELEASE Errata

+FreeBSD 8.4-RELEASE Errata

FreeBSD 8.4-RELEASE Errata

The FreeBSD Project -

FreeBSD is a registered trademark of +

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United @@ -14,7 +14,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2013-11-07 by delphij.
Abstract

This document lists errata items for FreeBSD 8.4-RELEASE, + ® symbol.

Last modified on 2015-02-05 by gjb.
Abstract

This document lists errata items for FreeBSD 8.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. @@ -23,7 +23,7 @@ operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 8.4-RELEASE - will be maintained until the FreeBSD 8.4-RELEASE end of life.


Table of Contents
1. Introduction
2. Security Advisories
3. Open Issues
4. Late-Breaking News and Corrections

1. Introduction

This errata document contains late-breaking news + will be maintained until the FreeBSD 8.4-RELEASE end of life.


Table of Contents
1. Introduction
2. Security Advisories
3. Errata Notices
4. Open Issues
5. Late-Breaking News and Corrections

1. Introduction

This errata document contains late-breaking news about FreeBSD 8.4-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems @@ -38,7 +38,48 @@ the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2. Security Advisories

Problems described in the following security advisories have been fixed in 8.4-RELEASE. For more information, consult the individual advisories available from - http://security.FreeBSD.org/.

AdvisoryDateTopic
SA-12:01.openssl03 May 2012

OpenSSL multiple vulnerabilities

SA-12:02.crypt30 May 2012

Incorrect crypt() hashing

SA-12:03.bind12 June 2012

Incorrect handling of zero-length RDATA fields in named(8)

SA-12:04.sysret12 June 2012

Privilege escalation when returning from kernel

SA-12:05.bind6 August 2012

named(8) DNSSEC validation Denial of Service

SA-12:06.bind22 November 2012

Multiple Denial of Service vulnerabilities with named(8)

SA-12:07.hostapd22 November 2012

Insufficient message length validation for EAP-TLS messages

SA-12:08.linux22 November 2012

Linux compatibility layer input validation error

SA-13:02.libc19 February 2013

glob(3) related resource exhaustion

SA-13:03.openssl02 April 2013

OpenSSL multiple vulnerabilities

SA-13:04.bind02 April 2013

BIND remote denial of service

SA-13:05.nfsserver29 April 2013

Insufficient input validation in the NFS server

3. Open Issues

[20130613] The vtnet(4) network interface driver + http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-13:07.bind26 July 2013

Denial of Service vulnerability in + named(8)

FreeBSD-SA-13:09.ip_multicast21 August 2013

Integer overflow in computing the size of + a temporary buffer can result in a buffer which is too + small for the requested operation

FreeBSD-SA-13:10.sctp21 August 2013

Fix a bug that could lead to kernel memory + disclosure with SCTP state cookie

FreeBSD-SA-13:12.ifioctl10 September 2013

In IPv6 and NetATM, stop + SIOCSIFADDR, + SIOCSIFBRDADDR, + SIOCSIFDSTADDR and + SIOCSIFNETMASK at the socket layer + rather than pass them on to the link layer without + validation or credential checks

FreeBSD-SA-13:13.nullfs10 September 2013

Prevent cross-mount hardlinks between different + nullfs mounts of the same underlying + filesystem

FreeBSD-SA-14:01.bsnmpd14 January 2014

bsnmpd remote denial of service + vulnerability

FreeBSD-SA-14:02.ntpd14 January 2014

ntpd distributed reflection Denial of Service + vulnerability

FreeBSD-SA-14:04.bind14 January 2014

BIND remote denial of service + vulnerability

FreeBSD-SA-14:05.nfsserver8 April 2014

NFS deadlock vulnerability

FreeBSD-SA-14:06.openssl8 April 2014

ECDSA Cache Side-channel Attack in + OpenSSL

FreeBSD-SA-14:08.tcp30 April 2014

TCP reassembly vulnerability

FreeBSD-SA-14:11.sendmail5 June 2014

sendmail improper close-on-exec flag + handling

FreeBSD-SA-14:12.ktrace5 June 2014

ktrace memory disclosure

FreeBSD-SA-14:14.openssl5 June 2014

OpenSSL multiple vulnerabilities

FreeBSD-SA-14:16.file5 June 2014

Multiple vulnerabilities in file(1) and + libmagic(3)

FreeBSD-SA-14:17.kmem8 July 2014

kernel memory disclosure in control message and + SCTP notifications

FreeBSD-SA-14:18.openssl9 September 2014

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-14:19.tcp16 September 2014

Denial of Service in TCP packet + processing

FreeBSD-SA-14:21.routed21 October 2014

routed(8) denial of service + vulnerability

FreeBSD-SA-14:23.openssl21 October 2014

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-14:25.setlogin4 November 2014

kernel stack disclosure in setlogin(2) and + getlogin(2)

FreeBSD-SA-14:26.ftp4 November 2014

Remote command execution in + ftp(1)

FreeBSD-SA-14:28.file10 December 2014

Multiple vulnerabilities in file(1) and + libmagic(3)

FreeBSD-SA-14:29.bind10 December 2014

BIND remote denial of service + vulnerability

FreeBSD-SA-14:31.ntp23 December 2014

Multiple vulnerabilities in NTP + suite

FreeBSD-SA-15:01.ntp14 January 2015

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-15:02.kmem27 January 2015

Fix SCTP SCTP_SS_VALUE kernel memory corruption + and disclosure vulnerability

FreeBSD-SA-15:03.sctp27 January 2015

Fix SCTP stream reset + vulnerability

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-13:01.fxp28 June 2013

Fixed a problem where dhclient(8) would + infinitely try to intialize fxp(4)

FreeBSD-EN-13:02.vtnet28 June 2013

Fixed a problem frames sent to additional MAC + addresses are not forwarded to the vtnet(4) + interface

FreeBSD-EN-13:04.freebsd-update26 October 2013

Multiple fixes

FreeBSD-EN-13:05.freebsd-update28 November 2013

Fix INDEX generation

FreeBSD-EN-14:01.random14 January 2014

Disable hardware RNGs by default

FreeBSD-EN-14:02.mmap14 January 2014

Fix incorrect coalescing of stack + entry

FreeBSD-EN-14:03.pkg15 May 2014

Add pkg bootstrapping, configuration and public + keys

FreeBSD-EN-14:04.kldxref15 May 2014

Improve build repeatability for + kldxref(8)

FreeBSD-EN-14:06.exec3 June 2014

Fix triple-fault when executing from a threaded + process

FreeBSD-EN-14:08.heimdal24 June 2014

Fix gss_pseudo_random() + interoperability issue

FreeBSD-EN-14:09.jail8 July 2014

Fix jail fails to start if + WITHOUT_INET/WITHOUT_INET6 is use

FreeBSD-EN-14:10.tzdata21 October 2014

Time zone data file update

FreeBSD-EN-14:12.zfs4 November 2014

Fix NFSv4 and ZFS cache consistency + issue

FreeBSD-EN-14:13.freebsd-update23 December 2014

Fix directory deletion issue

4. Open Issues

[20130613] The vtnet(4) network interface driver displays the following message upon configuration when using QEMU 1.4.1 and later:

vtnet0: error setting host MAC filter table

This message is harmless when the interface has only one MAC address. The patch for this issue is filed to a PR kern/178955.

[20130609] There is incompatibility in jail(8) @@ -94,7 +135,7 @@ allow.socket_af

[20130608] FreeBSD 8.4-RELEASE no longer supports FreeBS the dhclient(8) utility keeps trying to initialize the network interface forever.

kernel: fxp0: link state changed to UP
 kernel: fxp0: link state changed to DOWN

A patch to fix this issue will be released as an Errata - Notice.

4. Late-Breaking News and Corrections

[20130606] As described in FreeBSD 8.4-RELEASE Release Notes, + Notice.

5. Late-Breaking News and Corrections

[20130606] As described in FreeBSD 8.4-RELEASE Release Notes, FreeBSD ZFS subsystem has been updated to support feature flags for ZFS pools. However, the default version number of a newly created ZFS pool is still 28.

This is because FreeBSD 9.0 and 9.1 do not support the feature