Regen after r278275

Sponsored by:	The FreeBSD Foundation
This commit is contained in:
Glen Barber 2015-02-05 19:34:02 +00:00
parent 5349b9866f
commit aa1b8179e7
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=46258
2 changed files with 48 additions and 48 deletions
en_US.ISO8859-1/htdocs/releases

View file

@ -1,5 +1,5 @@
<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 8.4-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc@FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 8.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 8.4-RELEASE will be maintained until the FreeBSD 8.4-RELEASE end of life." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp60779216"></a>FreeBSD 8.4-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 8.4-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc@FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 8.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 8.4-RELEASE will be maintained until the FreeBSD 8.4-RELEASE end of life." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp60798032"></a>FreeBSD 8.4-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
The FreeBSD Project
</span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2015 The FreeBSD Documentation Project</p></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="legalnotice"><a id="trademarks"></a><p>FreeBSD is a registered trademark of
the FreeBSD Foundation.</p><p>Intel, Celeron, Centrino, Core, EtherExpress, i386,
@ -38,48 +38,48 @@
the snapshot).</p><p>For a list of all FreeBSD CERT security advisories, see <code class="uri"><a class="uri" href="http://www.FreeBSD.org/security/" target="_top">http://www.FreeBSD.org/security/</a></code> or <code class="uri"><a class="uri" href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/" target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a></code>.</p></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="security"></a>2. Security Advisories</h2></div></div></div><p>Problems described in the following security advisories have
been fixed in 8.4-RELEASE. For more information, consult
the individual advisories available from
<code class="uri"><a class="uri" href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a></code>.</p><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-13:07.bind.asc" target="_top">FreeBSD-SA-13:07.bind</a></td><td>26 July 2013</td><td><p>Denial of Service vulnerability in
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=named&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">named</span>(8)</span></a></p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc" target="_top">FreeBSD-SA-13:09.ip_multicast</a></td><td>21 August 2013</td><td><p>Integer overflow in computing the size of
<code class="uri"><a class="uri" href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a></code>.</p><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-13:07.bind.asc" target="_top">FreeBSD-SA-13:07.bind</a></td><td>26 July 2013</td><td><p>Denial of Service vulnerability in
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=named&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">named</span>(8)</span></a></p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-13:09.ip_multicast.asc" target="_top">FreeBSD-SA-13:09.ip_multicast</a></td><td>21 August 2013</td><td><p>Integer overflow in computing the size of
a temporary buffer can result in a buffer which is too
small for the requested operation</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-13:10.sctp.asc" target="_top">FreeBSD-SA-13:10.sctp</a></td><td>21 August 2013</td><td><p>Fix a bug that could lead to kernel memory
disclosure with SCTP state cookie</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-13:12.ifioctl.asc" target="_top">FreeBSD-SA-13:12.ifioctl</a></td><td>10 September 2013</td><td><p>In IPv6 and NetATM, stop
small for the requested operation</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-13:10.sctp.asc" target="_top">FreeBSD-SA-13:10.sctp</a></td><td>21 August 2013</td><td><p>Fix a bug that could lead to kernel memory
disclosure with SCTP state cookie</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-13:12.ifioctl.asc" target="_top">FreeBSD-SA-13:12.ifioctl</a></td><td>10 September 2013</td><td><p>In IPv6 and NetATM, stop
<code class="literal">SIOCSIFADDR</code>,
<code class="literal">SIOCSIFBRDADDR</code>,
<code class="literal">SIOCSIFDSTADDR</code> and
<code class="literal">SIOCSIFNETMASK</code> at the socket layer
rather than pass them on to the link layer without
validation or credential checks</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-13:13.nullfs.asc" target="_top">FreeBSD-SA-13:13.nullfs</a></td><td>10 September 2013</td><td><p>Prevent cross-mount hardlinks between different
validation or credential checks</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-13:13.nullfs.asc" target="_top">FreeBSD-SA-13:13.nullfs</a></td><td>10 September 2013</td><td><p>Prevent cross-mount hardlinks between different
nullfs mounts of the same underlying
filesystem</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:01.bsnmpd.asc" target="_top">FreeBSD-SA-14:01.bsnmpd</a></td><td>14 January 2014</td><td><p>bsnmpd remote denial of service
vulnerability</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:02.ntpd.asc" target="_top">FreeBSD-SA-14:02.ntpd</a></td><td>14 January 2014</td><td><p>ntpd distributed reflection Denial of Service
vulnerability</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:04.bind.asc" target="_top">FreeBSD-SA-14:04.bind</a></td><td>14 January 2014</td><td><p>BIND remote denial of service
vulnerability</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:05.nfsserver.asc" target="_top">FreeBSD-SA-14:05.nfsserver</a></td><td>8 April 2014</td><td><p>NFS deadlock vulnerability</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:06.openssl.asc" target="_top">FreeBSD-SA-14:06.openssl</a></td><td>8 April 2014</td><td><p>ECDSA Cache Side-channel Attack in
OpenSSL</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:08.tcp.asc" target="_top">FreeBSD-SA-14:08.tcp</a></td><td>30 April 2014</td><td><p>TCP reassembly vulnerability</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:11.sendmail.asc" target="_top">FreeBSD-SA-14:11.sendmail</a></td><td>5 June 2014</td><td><p>sendmail improper close-on-exec flag
handling</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:12.ktrace.asc" target="_top">FreeBSD-SA-14:12.ktrace</a></td><td>5 June 2014</td><td><p>ktrace memory disclosure</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:14.openssl.asc" target="_top">FreeBSD-SA-14:14.openssl</a></td><td>5 June 2014</td><td><p>OpenSSL multiple vulnerabilities</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:16.file.asc" target="_top">FreeBSD-SA-14:16.file</a></td><td>5 June 2014</td><td><p>Multiple vulnerabilities in <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a></p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:17.kmem.asc" target="_top">FreeBSD-SA-14:17.kmem</a></td><td>8 July 2014</td><td><p>kernel memory disclosure in control message and
SCTP notifications</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:18.openssl.asc" target="_top">FreeBSD-SA-14:18.openssl</a></td><td>9 September 2014</td><td><p>Multiple vulnerabilities in
OpenSSL</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:19.tcp.asc" target="_top">FreeBSD-SA-14:19.tcp</a></td><td>16 September 2014</td><td><p>Denial of Service in TCP packet
processing</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:21.routed.asc" target="_top">FreeBSD-SA-14:21.routed</a></td><td>21 October 2014</td><td><p><a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=routed&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">routed</span>(8)</span></a> denial of service
vulnerability</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:23.openssl.asc" target="_top">FreeBSD-SA-14:23.openssl</a></td><td>21 October 2014</td><td><p>Multiple vulnerabilities in
OpenSSL</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:25.setlogin.asc" target="_top">FreeBSD-SA-14:25.setlogin</a></td><td>4 November 2014</td><td><p>kernel stack disclosure in <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=setlogin&amp;sektion=2"><span class="citerefentry"><span class="refentrytitle">setlogin</span>(2)</span></a> and
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=getlogin&amp;sektion=2"><span class="citerefentry"><span class="refentrytitle">getlogin</span>(2)</span></a></p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:26.ftp.asc" target="_top">FreeBSD-SA-14:26.ftp</a></td><td>4 November 2014</td><td><p>Remote command execution in
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=ftp&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">ftp</span>(1)</span></a></p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:28.file.asc" target="_top">FreeBSD-SA-14:28.file</a></td><td>10 December 2014</td><td><p>Multiple vulnerabilities in <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a></p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:29.bind.asc" target="_top">FreeBSD-SA-14:29.bind</a></td><td>10 December 2014</td><td><p>BIND remote denial of service
vulnerability</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-14:31.ntp.asc" target="_top">FreeBSD-SA-14:31.ntp</a></td><td>23 December 2014</td><td><p>Multiple vulnerabilities in NTP
suite</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-15:01.openssl.asc" target="_top">FreeBSD-SA-15:01.ntp</a></td><td>14 January 2015</td><td><p>Multiple vulnerabilities in
OpenSSL</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-15:02.kmem.asc" target="_top">FreeBSD-SA-15:02.kmem</a></td><td>27 January 2015</td><td><p>Fix SCTP SCTP_SS_VALUE kernel memory corruption
and disclosure vulnerability</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-SA-15:03.sctp.asc" target="_top">FreeBSD-SA-15:03.sctp</a></td><td>27 January 2015</td><td><p>Fix SCTP stream reset
vulnerability</p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="errata"></a>3. Errata Notices</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Errata</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-13:01.fxp.asc" target="_top">FreeBSD-EN-13:01.fxp</a></td><td>28 June 2013</td><td><p>Fixed a problem where <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=dhclient&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">dhclient</span>(8)</span></a> would
infinitely try to intialize <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=fxp&amp;sektion=4"><span class="citerefentry"><span class="refentrytitle">fxp</span>(4)</span></a></p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-13:02.vtnet.asc" target="_top">FreeBSD-EN-13:02.vtnet</a></td><td>28 June 2013</td><td><p>Fixed a problem frames sent to additional MAC
filesystem</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc" target="_top">FreeBSD-SA-14:01.bsnmpd</a></td><td>14 January 2014</td><td><p>bsnmpd remote denial of service
vulnerability</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" target="_top">FreeBSD-SA-14:02.ntpd</a></td><td>14 January 2014</td><td><p>ntpd distributed reflection Denial of Service
vulnerability</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:04.bind.asc" target="_top">FreeBSD-SA-14:04.bind</a></td><td>14 January 2014</td><td><p>BIND remote denial of service
vulnerability</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:05.nfsserver.asc" target="_top">FreeBSD-SA-14:05.nfsserver</a></td><td>8 April 2014</td><td><p>NFS deadlock vulnerability</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:06.openssl.asc" target="_top">FreeBSD-SA-14:06.openssl</a></td><td>8 April 2014</td><td><p>ECDSA Cache Side-channel Attack in
OpenSSL</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:08.tcp.asc" target="_top">FreeBSD-SA-14:08.tcp</a></td><td>30 April 2014</td><td><p>TCP reassembly vulnerability</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:11.sendmail.asc" target="_top">FreeBSD-SA-14:11.sendmail</a></td><td>5 June 2014</td><td><p>sendmail improper close-on-exec flag
handling</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:12.ktrace.asc" target="_top">FreeBSD-SA-14:12.ktrace</a></td><td>5 June 2014</td><td><p>ktrace memory disclosure</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:14.openssl.asc" target="_top">FreeBSD-SA-14:14.openssl</a></td><td>5 June 2014</td><td><p>OpenSSL multiple vulnerabilities</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:16.file.asc" target="_top">FreeBSD-SA-14:16.file</a></td><td>5 June 2014</td><td><p>Multiple vulnerabilities in <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a></p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:17.kmem.asc" target="_top">FreeBSD-SA-14:17.kmem</a></td><td>8 July 2014</td><td><p>kernel memory disclosure in control message and
SCTP notifications</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:18.openssl.asc" target="_top">FreeBSD-SA-14:18.openssl</a></td><td>9 September 2014</td><td><p>Multiple vulnerabilities in
OpenSSL</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:19.tcp.asc" target="_top">FreeBSD-SA-14:19.tcp</a></td><td>16 September 2014</td><td><p>Denial of Service in TCP packet
processing</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:21.routed.asc" target="_top">FreeBSD-SA-14:21.routed</a></td><td>21 October 2014</td><td><p><a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=routed&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">routed</span>(8)</span></a> denial of service
vulnerability</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:23.openssl.asc" target="_top">FreeBSD-SA-14:23.openssl</a></td><td>21 October 2014</td><td><p>Multiple vulnerabilities in
OpenSSL</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:25.setlogin.asc" target="_top">FreeBSD-SA-14:25.setlogin</a></td><td>4 November 2014</td><td><p>kernel stack disclosure in <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=setlogin&amp;sektion=2"><span class="citerefentry"><span class="refentrytitle">setlogin</span>(2)</span></a> and
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=getlogin&amp;sektion=2"><span class="citerefentry"><span class="refentrytitle">getlogin</span>(2)</span></a></p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:26.ftp.asc" target="_top">FreeBSD-SA-14:26.ftp</a></td><td>4 November 2014</td><td><p>Remote command execution in
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=ftp&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">ftp</span>(1)</span></a></p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:28.file.asc" target="_top">FreeBSD-SA-14:28.file</a></td><td>10 December 2014</td><td><p>Multiple vulnerabilities in <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a></p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:29.bind.asc" target="_top">FreeBSD-SA-14:29.bind</a></td><td>10 December 2014</td><td><p>BIND remote denial of service
vulnerability</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:31.ntp.asc" target="_top">FreeBSD-SA-14:31.ntp</a></td><td>23 December 2014</td><td><p>Multiple vulnerabilities in NTP
suite</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:01.openssl.asc" target="_top">FreeBSD-SA-15:01.ntp</a></td><td>14 January 2015</td><td><p>Multiple vulnerabilities in
OpenSSL</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:02.kmem.asc" target="_top">FreeBSD-SA-15:02.kmem</a></td><td>27 January 2015</td><td><p>Fix SCTP SCTP_SS_VALUE kernel memory corruption
and disclosure vulnerability</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:03.sctp.asc" target="_top">FreeBSD-SA-15:03.sctp</a></td><td>27 January 2015</td><td><p>Fix SCTP stream reset
vulnerability</p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="errata"></a>3. Errata Notices</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Errata</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-13:01.fxp.asc" target="_top">FreeBSD-EN-13:01.fxp</a></td><td>28 June 2013</td><td><p>Fixed a problem where <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=dhclient&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">dhclient</span>(8)</span></a> would
infinitely try to intialize <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=fxp&amp;sektion=4"><span class="citerefentry"><span class="refentrytitle">fxp</span>(4)</span></a></p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-13:02.vtnet.asc" target="_top">FreeBSD-EN-13:02.vtnet</a></td><td>28 June 2013</td><td><p>Fixed a problem frames sent to additional MAC
addresses are not forwarded to the <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=vtnet&amp;sektion=4"><span class="citerefentry"><span class="refentrytitle">vtnet</span>(4)</span></a>
interface</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-13:04.freebsd-update.asc" target="_top">FreeBSD-EN-13:04.freebsd-update</a></td><td>26 October 2013</td><td><p>Multiple fixes</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-13:05.freebsd-update.asc" target="_top">FreeBSD-EN-13:05.freebsd-update</a></td><td>28 November 2013</td><td><p>Fix INDEX generation</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:01.random.asc" target="_top">FreeBSD-EN-14:01.random</a></td><td>14 January 2014</td><td><p>Disable hardware RNGs by default</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:02.mmap.asc" target="_top">FreeBSD-EN-14:02.mmap</a></td><td>14 January 2014</td><td><p>Fix incorrect coalescing of stack
entry</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:03.pkg.asc" target="_top">FreeBSD-EN-14:03.pkg</a></td><td>15 May 2014</td><td><p>Add pkg bootstrapping, configuration and public
keys</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:04.kldxref.asc" target="_top">FreeBSD-EN-14:04.kldxref</a></td><td>15 May 2014</td><td><p>Improve build repeatability for
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=kldxref&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">kldxref</span>(8)</span></a></p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:06.exec.asc" target="_top">FreeBSD-EN-14:06.exec</a></td><td>3 June 2014</td><td><p>Fix triple-fault when executing from a threaded
process</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:08.heimdal.asc" target="_top">FreeBSD-EN-14:08.heimdal</a></td><td>24 June 2014</td><td><p>Fix <code class="literal">gss_pseudo_random()</code>
interoperability issue</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:09.jail.asc" target="_top">FreeBSD-EN-14:09.jail</a></td><td>8 July 2014</td><td><p>Fix jail fails to start if
WITHOUT_INET/WITHOUT_INET6 is use</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:10.tzdata.asc" target="_top">FreeBSD-EN-14:10.tzdata</a></td><td>21 October 2014</td><td><p>Time zone data file update</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:12.zfs.asc" target="_top">FreeBSD-EN-14:12.zfs</a></td><td>4 November 2014</td><td><p>Fix NFSv4 and ZFS cache consistency
issue</p></td></tr><tr><td><a class="link" href="http://security.freebsd.org/advisories/FreeBSD-EN-14:13.freebsd-update.asc" target="_top">FreeBSD-EN-14:13.freebsd-update</a></td><td>23 December 2014</td><td><p>Fix directory deletion issue</p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="open-issues"></a>4. Open Issues</h2></div></div></div><p>[20130613] The <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=vtnet&amp;sektion=4"><span class="citerefentry"><span class="refentrytitle">vtnet</span>(4)</span></a> network interface driver
interface</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-13:04.freebsd-update.asc" target="_top">FreeBSD-EN-13:04.freebsd-update</a></td><td>26 October 2013</td><td><p>Multiple fixes</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-13:05.freebsd-update.asc" target="_top">FreeBSD-EN-13:05.freebsd-update</a></td><td>28 November 2013</td><td><p>Fix INDEX generation</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:01.random.asc" target="_top">FreeBSD-EN-14:01.random</a></td><td>14 January 2014</td><td><p>Disable hardware RNGs by default</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:02.mmap.asc" target="_top">FreeBSD-EN-14:02.mmap</a></td><td>14 January 2014</td><td><p>Fix incorrect coalescing of stack
entry</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:03.pkg.asc" target="_top">FreeBSD-EN-14:03.pkg</a></td><td>15 May 2014</td><td><p>Add pkg bootstrapping, configuration and public
keys</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:04.kldxref.asc" target="_top">FreeBSD-EN-14:04.kldxref</a></td><td>15 May 2014</td><td><p>Improve build repeatability for
<a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=kldxref&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">kldxref</span>(8)</span></a></p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:06.exec.asc" target="_top">FreeBSD-EN-14:06.exec</a></td><td>3 June 2014</td><td><p>Fix triple-fault when executing from a threaded
process</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:08.heimdal.asc" target="_top">FreeBSD-EN-14:08.heimdal</a></td><td>24 June 2014</td><td><p>Fix <code class="literal">gss_pseudo_random()</code>
interoperability issue</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:09.jail.asc" target="_top">FreeBSD-EN-14:09.jail</a></td><td>8 July 2014</td><td><p>Fix jail fails to start if
WITHOUT_INET/WITHOUT_INET6 is use</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:10.tzdata.asc" target="_top">FreeBSD-EN-14:10.tzdata</a></td><td>21 October 2014</td><td><p>Time zone data file update</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:12.zfs.asc" target="_top">FreeBSD-EN-14:12.zfs</a></td><td>4 November 2014</td><td><p>Fix NFSv4 and ZFS cache consistency
issue</p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:13.freebsd-update.asc" target="_top">FreeBSD-EN-14:13.freebsd-update</a></td><td>23 December 2014</td><td><p>Fix directory deletion issue</p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="open-issues"></a>4. Open Issues</h2></div></div></div><p>[20130613] The <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=vtnet&amp;sektion=4"><span class="citerefentry"><span class="refentrytitle">vtnet</span>(4)</span></a> network interface driver
displays the following message upon configuration when using
<span class="application">QEMU</span> 1.4.1 and later:</p><pre class="screen">vtnet0: error setting host MAC filter table</pre><p>This message is harmless when the interface has only one MAC
address. The patch for this issue is filed to a PR <a class="link" href="http://www.FreeBSD.org/cgi/query-pr.cgi?pr=178955" target="_top">kern/178955</a>.</p><p>[20130609] There is incompatibility in <a class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=jail&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">jail</span>(8)</span></a>

View file

@ -1,5 +1,5 @@
<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 9.3-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc@FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 9.3-RELEASE will be maintained until the EoL of FreeBSD 9.3-STABLE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp61843024"></a>FreeBSD 9.3-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 9.3-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc@FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 9.3-RELEASE will be maintained until the EoL of FreeBSD 9.3-STABLE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp61900368"></a>FreeBSD 9.3-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
The FreeBSD Project
</span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2015 The FreeBSD Documentation Project</p></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="legalnotice"><a id="trademarks"></a><p xmlns="http://www.w3.org/TR/xhtml1/transitional">FreeBSD is a registered trademark of
the FreeBSD Foundation. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Intel, Celeron, Centrino, Core, EtherExpress, i386,
@ -38,19 +38,19 @@
the snapshot). </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">For a list of all FreeBSD CERT security advisories, see <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="http://www.FreeBSD.org/security/" target="_top">http://www.FreeBSD.org/security/</a></code> or <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/" target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a></code>. </p></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="security"></a>2. Security Advisories</h2></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Problems described in the following security advisories have
been fixed in 9.3-RELEASE. For more information, consult
the individual advisories available from
<code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a></code>. </p><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc" target="_top">FreeBSD-SA-14:18.openssl</a></td><td>9 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc" target="_top">FreeBSD-SA-14:19.tcp</a></td><td>16 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Denial of Service in TCP packet
processing. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:20.rtsold.asc" target="_top">FreeBSD-SA-14:20.rtsold</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote buffer overflow
vulnerability. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:21.routed.asc" target="_top">FreeBSD-SA-14:21.routed</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
vulnerability. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:22.namei.asc" target="_top">FreeBSD-SA-14:22.namei</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Memory leak in sandboxed namei
lookup. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:23.openssl.asc" target="_top">FreeBSD-SA-14:23.openssl</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulerabilities. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:25.setlogin.asc" target="_top">FreeBSD-SA-14:25.setlogin</a></td><td>04 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Kernel stack disclosure. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:26.ftp.asc" target="_top">FreeBSD-SA-14:26.ftp</a></td><td>04 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote code execution. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc" target="_top">FreeBSD-SA-14:28.file</a></td><td>10 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities in <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
<a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a> </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:29.bind.asc" target="_top">FreeBSD-SA-14:29.bind</a></td><td>10 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:31.ntp.asc" target="_top">FreeBSD-SA-14:31.ntp</a></td><td>23 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:01.openssl.asc" target="_top">FreeBSD-SA-15:01.openssl</a></td><td>14 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:02.kmem.asc" target="_top">FreeBSD-SA-15:02.kmem</a></td><td>27 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP kernel memory corruption and
disclosure vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:03.sctp.asc" target="_top">FreeBSD-SA-15:03.sctp</a></td><td>27 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP stream reset
vulnerability </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="errata"></a>3. Errata Notices</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Errata</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:10.tzdata.asc" target="_top">FreeBSD-EN-14:10.tzdata</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Time zone data file update </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:11.crypt.asc" target="_top">FreeBSD-EN-14:11.crypt</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Change <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=crypt&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">crypt</span>(3)</span></a> default hashing algorithm
back to DES </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:12.zfs.asc" target="_top">FreeBSD-EN-14:12.zfs</a></td><td>11 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix NFSv4 and ZFS cache consistency
issue </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:13.freebsd-update.asc" target="_top">FreeBSD-EN-14:13.freebsd-update</a></td><td>23 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fixed directory deletion issue in
<code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a></code>. </p><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:18.openssl.asc" target="_top">FreeBSD-SA-14:18.openssl</a></td><td>9 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:19.tcp.asc" target="_top">FreeBSD-SA-14:19.tcp</a></td><td>16 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Denial of Service in TCP packet
processing. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:20.rtsold.asc" target="_top">FreeBSD-SA-14:20.rtsold</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote buffer overflow
vulnerability. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:21.routed.asc" target="_top">FreeBSD-SA-14:21.routed</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
vulnerability. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:22.namei.asc" target="_top">FreeBSD-SA-14:22.namei</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Memory leak in sandboxed namei
lookup. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:23.openssl.asc" target="_top">FreeBSD-SA-14:23.openssl</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulerabilities. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:25.setlogin.asc" target="_top">FreeBSD-SA-14:25.setlogin</a></td><td>04 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Kernel stack disclosure. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:26.ftp.asc" target="_top">FreeBSD-SA-14:26.ftp</a></td><td>04 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote code execution. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:28.file.asc" target="_top">FreeBSD-SA-14:28.file</a></td><td>10 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities in <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
<a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a> </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:29.bind.asc" target="_top">FreeBSD-SA-14:29.bind</a></td><td>10 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:31.ntp.asc" target="_top">FreeBSD-SA-14:31.ntp</a></td><td>23 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:01.openssl.asc" target="_top">FreeBSD-SA-15:01.openssl</a></td><td>14 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:02.kmem.asc" target="_top">FreeBSD-SA-15:02.kmem</a></td><td>27 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP kernel memory corruption and
disclosure vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:03.sctp.asc" target="_top">FreeBSD-SA-15:03.sctp</a></td><td>27 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP stream reset
vulnerability </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="errata"></a>3. Errata Notices</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Errata</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:10.tzdata.asc" target="_top">FreeBSD-EN-14:10.tzdata</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Time zone data file update </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:11.crypt.asc" target="_top">FreeBSD-EN-14:11.crypt</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Change <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=crypt&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">crypt</span>(3)</span></a> default hashing algorithm
back to DES </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:12.zfs.asc" target="_top">FreeBSD-EN-14:12.zfs</a></td><td>11 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix NFSv4 and ZFS cache consistency
issue </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:13.freebsd-update.asc" target="_top">FreeBSD-EN-14:13.freebsd-update</a></td><td>23 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fixed directory deletion issue in
<a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=freebsd-update&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">freebsd-update</span>(8)</span></a> </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="late-news"></a>4. Late-Breaking News</h2></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">No late-breaking news. </p></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>This file, and other release-related documents,
can be downloaded from <a href="http://www.FreeBSD.org/releases/">http://www.FreeBSD.org/releases/</a>.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>For questions about FreeBSD, read the
can be downloaded from <a href="https://www.FreeBSD.org/releases/">https://www.FreeBSD.org/releases/</a>.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>For questions about FreeBSD, read the
<a href="http://www.FreeBSD.org/docs.html">documentation</a> before
contacting &lt;<a href="mailto:questions@FreeBSD.org">questions@FreeBSD.org</a>&gt;.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>All users of FreeBSD 9.3-STABLE should
subscribe to the &lt;<a href="mailto:stable@FreeBSD.org">stable@FreeBSD.org</a>&gt;