aboutsummaryrefslogtreecommitdiff
path: root/website/content/en/releases/9.3R/errata.html
diff options
context:
space:
mode:
Diffstat (limited to 'website/content/en/releases/9.3R/errata.html')
-rw-r--r--website/content/en/releases/9.3R/errata.html101
1 files changed, 0 insertions, 101 deletions
diff --git a/website/content/en/releases/9.3R/errata.html b/website/content/en/releases/9.3R/errata.html
deleted file mode 100644
index 4908f9e731..0000000000
--- a/website/content/en/releases/9.3R/errata.html
+++ /dev/null
@@ -1,101 +0,0 @@
-<?xml version="1.0" encoding="iso-8859-1"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 9.3-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc@FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 9.3-RELEASE will be maintained until the EoL of FreeBSD 9.3-STABLE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp61013096"></a>FreeBSD 9.3-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
- The FreeBSD Project
- </span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright � 2016 The FreeBSD Documentation Project</p></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="legalnotice"><a id="trademarks"></a><p xmlns="http://www.w3.org/TR/xhtml1/transitional">FreeBSD is a registered trademark of
- the FreeBSD Foundation. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Intel, Celeron, Centrino, Core, EtherExpress, i386,
- i486, Itanium, Pentium, and Xeon are trademarks or registered
- trademarks of Intel Corporation or its subsidiaries in the United
- States and other countries. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SPARC, SPARC64, and
- UltraSPARC are trademarks of SPARC International, Inc in the United
- States and other countries. SPARC International, Inc owns all of the
- SPARC trademarks and under licensing agreements allows the proper use
- of these trademarks by its members. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Many of the designations used by
- manufacturers and sellers to distinguish their products are claimed
- as trademarks. Where those designations appear in this document,
- and the FreeBSD Project was aware of the trademark claim, the
- designations have been followed by the <span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">&#8482;</span>&#8221;</span> or the
- <span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">�</span>&#8221;</span> symbol. </p></div></div><div>Last modified on 2016-01-14 11:11:46Z by gjb.</div><div><div xmlns="http://www.w3.org/1999/xhtml" class="abstract"><div class="abstract-title">Abstract</div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">This document lists errata items for FreeBSD 9.3-RELEASE,
- containing significant information discovered after the release
- or too late in the release cycle to be otherwise included in the
- release documentation.
- This information includes security advisories, as well as news
- relating to the software or documentation that could affect its
- operation or usability. An up-to-date version of this document
- should always be consulted before installing this version of
- FreeBSD. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">This errata document for FreeBSD 9.3-RELEASE
- will be maintained until the EoL of FreeBSD 9.3-STABLE. </p></div></div></div><hr /></div><div class="toc"><div class="toc-title">Table of Contents</div><dl class="toc"><dt><span class="sect1"><a href="#intro">1. Introduction</a></span></dt><dt><span class="sect1"><a href="#security">2. Security Advisories</a></span></dt><dt><span class="sect1"><a href="#errata">3. Errata Notices</a></span></dt><dt><span class="sect1"><a href="#late-news">4. Late-Breaking News</a></span></dt></dl></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="intro"></a>1.�Introduction</h2></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">This errata document contains <span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">late-breaking news</span>&#8221;</span>
- about FreeBSD 9.3-RELEASE
- Before installing this version, it is important to consult this
- document to learn about any post-release discoveries or problems
- that may already have been found and fixed. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Any version of this errata document actually distributed
- with the release (for example, on a CDROM distribution) will be
- out of date by definition, but other copies are kept updated on
- the Internet and should be consulted as the <span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">current
- errata</span>&#8221;</span> for this release. These other copies of the
- errata are located at <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="https://www.FreeBSD.org/releases/" target="_top">https://www.FreeBSD.org/releases/</a></code>, plus any sites
- which keep up-to-date mirrors of this location. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Source and binary snapshots of FreeBSD 9.3-STABLE also
- contain up-to-date copies of this document (as of the time of
- the snapshot). </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">For a list of all FreeBSD CERT security advisories, see <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="https://www.FreeBSD.org/security/" target="_top">https://www.FreeBSD.org/security/</a></code>. </p></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="security"></a>2.�Security Advisories</h2></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Problems described in the following security advisories have
- been fixed in 9.3-RELEASE. For more information, consult
- the individual advisories available from
- <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a></code>. </p><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:18.openssl.asc" target="_top">FreeBSD-SA-14:18.openssl</a></td><td>9�September�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:19.tcp.asc" target="_top">FreeBSD-SA-14:19.tcp</a></td><td>16�September�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Denial of Service in TCP packet
- processing. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:20.rtsold.asc" target="_top">FreeBSD-SA-14:20.rtsold</a></td><td>21�October�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote buffer overflow
- vulnerability. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:21.routed.asc" target="_top">FreeBSD-SA-14:21.routed</a></td><td>21�October�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
- vulnerability. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:22.namei.asc" target="_top">FreeBSD-SA-14:22.namei</a></td><td>21�October�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Memory leak in sandboxed namei
- lookup. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:23.openssl.asc" target="_top">FreeBSD-SA-14:23.openssl</a></td><td>21�October�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulerabilities. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:25.setlogin.asc" target="_top">FreeBSD-SA-14:25.setlogin</a></td><td>04�November�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Kernel stack disclosure. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:26.ftp.asc" target="_top">FreeBSD-SA-14:26.ftp</a></td><td>04�November�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote code execution. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:28.file.asc" target="_top">FreeBSD-SA-14:28.file</a></td><td>10�December�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities in <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
- <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a> </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:29.bind.asc" target="_top">FreeBSD-SA-14:29.bind</a></td><td>10�December�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-14:31.ntp.asc" target="_top">FreeBSD-SA-14:31.ntp</a></td><td>23�December�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:01.openssl.asc" target="_top">FreeBSD-SA-15:01.openssl</a></td><td>14�January�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:02.kmem.asc" target="_top">FreeBSD-SA-15:02.kmem</a></td><td>27�January�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP kernel memory corruption and
- disclosure vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:03.sctp.asc" target="_top">FreeBSD-SA-15:03.sctp</a></td><td>27�January�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP stream reset
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:04.igmp.asc" target="_top">FreeBSD-SA-15:04.igmp</a></td><td>25�February�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Integer overflow in IGMP protocol </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:05.bind.asc" target="_top">FreeBSD-SA-15:05.igmp</a></td><td>25�February�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:06.openssl.asc" target="_top">FreeBSD-SA-15:06.openssl</a></td><td>19�March�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:07.ntp.asc" target="_top">FreeBSD-SA-15:07.ntp</a></td><td>7�April�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:09.ipv6.asc" target="_top">FreeBSD-SA-15:09.ipv6</a></td><td>7�April�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Router advertisement Denial of
- Service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:10.openssl.asc" target="_top">FreeBSD-SA-15:10.openssl</a></td><td>16�June�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:11.bind.asc" target="_top">FreeBSD-SA-15:11.bind</a></td><td>7�July�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Resolver remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:13.tcp.asc" target="_top">FreeBSD-SA-15:13.tcp</a></td><td>21�July�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">resource exhaustion due to sessions stuck in
- <code xmlns="http://www.w3.org/1999/xhtml" class="literal">LAST_ACK</code> state. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:15.tcp.asc" target="_top">FreeBSD-SA-15:15.tcp</a></td><td>28�July�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">resource exhaustion in <acronym xmlns="http://www.w3.org/1999/xhtml" class="acronym">TCP</acronym>
- reassembly </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:16.openssh.asc" target="_top">FreeBSD-SA-15:16.openssh</a></td><td>28�July�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:17.bind.asc" target="_top">FreeBSD-SA-15:17.bind</a></td><td>28�July�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:19.routed.asc" target="_top">FreeBSD-SA-15:19.routed</a></td><td>5�August�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:20.expat.asc" target="_top">FreeBSD-SA-15:20.expat</a></td><td>18�August�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix multiple integer overflows in
- <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libbsdxml&amp;sektion=3&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">libbsdxml</span>(3)</span></a>. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:21.amd64.asc" target="_top">FreeBSD-SA-15:21.amd64</a></td><td>25�August�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix local privilege escalation in IRET
- handler. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:22.openssh.asc" target="_top">FreeBSD-SA-15:22.openssh</a></td><td>25�August�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:23.bind.asc" target="_top">FreeBSD-SA-15:23.bind</a></td><td>2�September�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:24.rpcbind.asc" target="_top">FreeBSD-SA-15:24.rpcbind</a></td><td>29�September�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:25.ntp.asc" target="_top">FreeBSD-SA-15:25.ntp</a></td><td>26�October�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:26.openssl.asc" target="_top">FreeBSD-SA-15:26.openssl</a></td><td>5�December�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:27.bind.asc" target="_top">FreeBSD-SA-15:27.bind</a></td><td>16�December�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:01.sctp.asc" target="_top">FreeBSD-SA-16:01.sctp</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">ICMPv6 error message vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:02.ntp.asc" target="_top">FreeBSD-SA-16:02.ntp</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Panic threshold bypass
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:03.linux.asc" target="_top">FreeBSD-SA-16:03.linux</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Incorrect <code xmlns="http://www.w3.org/1999/xhtml" class="literal">futex</code>
- handling </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:04.linux.asc" target="_top">FreeBSD-SA-16:04.linux</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=setgroups&amp;sektion=2&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">setgroups</span>(2)</span></a> system call
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:05.tcp.asc" target="_top">FreeBSD-SA-16:05.tcp</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">MD5 signature denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:06.bsnmpd.asc" target="_top">FreeBSD-SA-16:06.bsnmpd</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Insecure default configuration file
- permissions </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:07.openssh.asc" target="_top">FreeBSD-SA-16:07.openssh</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><span xmlns="http://www.w3.org/1999/xhtml" class="application">OpenSSH</span> client
- information leak </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:08.bind.asc" target="_top">FreeBSD-SA-16:08.bind</a></td><td>27�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
- vulnerability. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:09.ntp.asc" target="_top">FreeBSD-SA-16:09.ntp</a></td><td>27�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:10.linux.asc" target="_top">FreeBSD-SA-16:10.linux</a></td><td>27�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=issetugid&amp;sektion=2&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">issetugid</span>(2)</span></a> system call
- vulnerability. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:11.openssl.asc" target="_top">FreeBSD-SA-16:11.openssl</a></td><td>30�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SSLv2 cipher suite downgrade
- vulnerability. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:12.openssl.asc" target="_top">FreeBSD-SA-16:12.openssl</a></td><td>7�March�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:13.bind.asc" target="_top">FreeBSD-SA-16:13.bind</a></td><td>10�March�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:14.openssh-xauth.asc" target="_top">FreeBSD-SA-16:14.openssh-xauth</a></td><td>16�March�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">OpenSSH xauth injection
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:15.sysarch.asc" target="_top">FreeBSD-SA-16:15.sysarch</a></td><td>16�March�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Incorrect argument validation in
- <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=sysarch&amp;sektion=2&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">sysarch</span>(2)</span></a> </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:09.ntp.asc" target="_top">FreeBSD-SA-16:09.ntp</a></td><td>29�April�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple <span xmlns="http://www.w3.org/1999/xhtml" class="application">ntp</span>
- vulnerabilities. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:17.openssl.asc" target="_top">FreeBSD-SA-16:17.openssl</a></td><td>29�April�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple <span xmlns="http://www.w3.org/1999/xhtml" class="application">OpenSSL</span>
- vulnerabilities. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:18.atkbd.asc" target="_top">FreeBSD-SA-16:18.atkbd</a></td><td>17�May�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Keyboard driver buffer overflow </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:19.sendmsg.asc" target="_top">FreeBSD-SA-16:19.sendmsg</a></td><td>17�May�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Incorrect argument handling in
- <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=sendmsg&amp;sektion=2&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">sendmsg</span>(2)</span></a> </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:20.linux.asc" target="_top">FreeBSD-SA-16:20.linux</a></td><td>31�May�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Kernel stack disclosure in Linux compatibility
- layer </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:21.43bsd.asc" target="_top">FreeBSD-SA-16:21.43bsd</a></td><td>31�May�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Kernel stack disclosure in 4.3BSD compatibility
- layer </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" target="_top">FreeBSD-SA-16:22.libarchive</a></td><td>31�May�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Absolute path traversal
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:23.libarchive.asc" target="_top">FreeBSD-SA-16:23.libarchive</a></td><td>31�May�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Absolute path traversal
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:24.ntp.asc" target="_top">FreeBSD-SA-16:24.ntp</a></td><td>3�June�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple <span xmlns="http://www.w3.org/1999/xhtml" class="application">ntp</span>
- vulnerabilties </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:25.bspatch.asc" target="_top">FreeBSD-SA-16:25.bspatch</a></td><td>25�July�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">heap overflow vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:26.openssl.asc" target="_top">FreeBSD-SA-16:26.openssl</a></td><td>23�September�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:27.openssl.asc" target="_top">FreeBSD-SA-16:27.openssl</a></td><td>26�September�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Regression in <span xmlns="http://www.w3.org/1999/xhtml" class="application">OpenSSL</span>
- suite </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:28.bind.asc" target="_top">FreeBSD-SA-16:28.bind</a></td><td>10�October�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><span xmlns="http://www.w3.org/1999/xhtml" class="application">BIND</span> denial of
- service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:29.bspatch.asc" target="_top">FreeBSD-SA-16:29.bspatch</a></td><td>10�October�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Heap overflow vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:30.portsnap.asc" target="_top">FreeBSD-SA-16:30.portsnap</a></td><td>10�October�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:31.libarchive.asc" target="_top">FreeBSD-SA-16:31.libarchive</a></td><td>10�October�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:34.bind.asc" target="_top">FreeBSD-SA-16:34.bind</a></td><td>2�November�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote Denial of Service
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:35.openssl.asc" target="_top">FreeBSD-SA-16:35.openssl</a></td><td>2�November�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote Denial of Service
- vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:36.telnetd.asc" target="_top">FreeBSD-SA-16:36.telnetd</a></td><td>6�December�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Possible <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=login&amp;sektion=1&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">login</span>(1)</span></a> argument
- injection </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:37.libc.asc" target="_top">FreeBSD-SA-16:37.libc</a></td><td>6�December�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=link_ntoa&amp;sektion=3&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">link_ntoa</span>(3)</span></a> buffer overflow </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="errata"></a>3.�Errata Notices</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Errata</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:10.tzdata.asc" target="_top">FreeBSD-EN-14:10.tzdata</a></td><td>21�October�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Time zone data file update </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:11.crypt.asc" target="_top">FreeBSD-EN-14:11.crypt</a></td><td>21�October�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Change <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=crypt&amp;sektion=3&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">crypt</span>(3)</span></a> default hashing algorithm
- back to DES </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:12.zfs.asc" target="_top">FreeBSD-EN-14:12.zfs</a></td><td>11�November�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix NFSv4 and ZFS cache consistency
- issue </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:13.freebsd-update.asc" target="_top">FreeBSD-EN-14:13.freebsd-update</a></td><td>23�December�2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fixed directory deletion issue in
- <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=freebsd-update&amp;sektion=8&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">freebsd-update</span>(8)</span></a> </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:01.vt.asc" target="_top">FreeBSD-EN-15:01.vt</a></td><td>25�February�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=vt&amp;sektion=4&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">vt</span>(4)</span></a> crash with improper ioctl
- parameters </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:02.openssl.asc" target="_top">FreeBSD-EN-15:02.openssl</a></td><td>25�February�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">OpenSSL update </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:03.freebsd-update.asc" target="_top">FreeBSD-EN-15:03.freebsd-update</a></td><td>25�February�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=freebsd-update&amp;sektion=8&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">freebsd-update</span>(8)</span></a> updates libraries in
- suboptimal order </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:04.freebsd-update.asc" target="_top">FreeBSD-EN-15:04.freebsd-update</a></td><td>13�May�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=freebsd-update&amp;sektion=8&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">freebsd-update</span>(8)</span></a> does not ensure the
- previous upgrade has completed </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:06.file.asc" target="_top">FreeBSD-EN-15:06.file</a></td><td>9�June�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple denial of service issues </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:08.sendmail.asc" target="_top">FreeBSD-EN-15:08.sendmail</a></td><td>30�June�2015 (revised)</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Sendmail TLS/DH interoperability improvement </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:09.xlocale.asc" target="_top">FreeBSD-EN-15:09.xlocale</a></td><td>30�June�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix inconsistency between locale and rune locale states </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:15.pkg.asc" target="_top">FreeBSD-EN-15:15.pkg</a></td><td>25�August�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Insufficient check of supported <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=pkg&amp;sektion=7&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">pkg</span>(7)</span></a>
- signature methods. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:18.pkg.asc" target="_top">FreeBSD-EN-15:18.pkg</a></td><td>16�September�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Implement <code xmlns="http://www.w3.org/1999/xhtml" class="literal">pubkey</code> support for
- <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=pkg&amp;sektion=7&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">pkg</span>(7)</span></a> bootstrap. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:19.kqueue.asc" target="_top">FreeBSD-EN-15:19.kqueue</a></td><td>4�November�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=kqueue&amp;sektion=2&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">kqueue</span>(2)</span></a> write events never fire for files
- larger than 2GB. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:20.vm.asc" target="_top">FreeBSD-EN-15:20.vm</a></td><td>4�November�2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Applications exiting due to segmentation
- violation on a correct memory address. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:02.pf.asc" target="_top">FreeBSD-EN-16:02.pf</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Invalid TCP checksum issue. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:03.yplib.asc" target="_top">FreeBSD-EN-16:03.yplib</a></td><td>14�January�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><span xmlns="http://www.w3.org/1999/xhtml" class="application">YP/NIS</span> library
- bug. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:08.zfs.asc" target="_top">FreeBSD-EN-16:08.zfs</a></td><td>4�May�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Memory leak in ZFS </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:09.freebsd-update.asc" target="_top">FreeBSD-EN-16:09.freebsd-update</a></td><td>25�July�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=freebsd-update&amp;sektion=8&amp;manpath=freebsd-release-ports"><span class="citerefentry"><span class="refentrytitle">freebsd-update</span>(8)</span></a> support of
- FreeBSD�11.0-RELEASE </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:19.tzcode.asc" target="_top">FreeBSD-EN-16:19.tzcode</a></td><td>6�December�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix warnings about invalid timezone
- abbreviations </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:20.tzdata.asc" target="_top">FreeBSD-EN-16:20.tzdata</a></td><td>6�December�2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Update timezone database
- information </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="late-news"></a>4.�Late-Breaking News</h2></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">No late-breaking news. </p></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>This file, and other release-related documents,
- can be downloaded from <a href="https://www.FreeBSD.org/releases/">https://www.FreeBSD.org/releases/</a>.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>For questions about FreeBSD, read the
- <a href="http://www.FreeBSD.org/docs.html">documentation</a> before
- contacting &lt;<a href="mailto:questions@FreeBSD.org">questions@FreeBSD.org</a>&gt;.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>All users of FreeBSD 9.3-STABLE should
- subscribe to the &lt;<a href="mailto:stable@FreeBSD.org">stable@FreeBSD.org</a>&gt;
- mailing list.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>For questions about this documentation,
- e-mail &lt;<a href="mailto:doc@FreeBSD.org">doc@FreeBSD.org</a>&gt;.</small></p></body></html> \ No newline at end of file