1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
|
<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="generator" content="HTML Tidy, see www.w3.org" />
<title>FreeBSD 4.7-RELEASE Errata</title>
<meta name="GENERATOR"
content="Modular DocBook HTML Stylesheet Version 1.73 " />
<link rel="STYLESHEET" type="text/css" href="docbook.css" />
</head>
<body class="ARTICLE" bgcolor="#FFFFFF" text="#000000"
link="#0000FF" vlink="#840084" alink="#0000FF">
<div class="ARTICLE">
<div class="TITLEPAGE">
<h1 class="TITLE"><a id="AEN2" name="AEN2">FreeBSD
4.7-RELEASE Errata</a></h1>
<h3 class="CORPAUTHOR">The FreeBSD Project</h3>
<p class="COPYRIGHT">Copyright © 2000, 2001, 2002,
2003 by The FreeBSD Documentation Project</p>
<p class="PUBDATE">$FreeBSD:
src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
1.1.2.97 2003/03/20 20:03:52 bmah Exp $<br />
</p>
<hr />
</div>
<blockquote class="ABSTRACT">
<div class="ABSTRACT">
<a id="AEN12" name="AEN12"></a>
<p>This document lists errata items for FreeBSD
4.7-RELEASE, containing significant information
discovered after the release. This information includes
security advisories, as well as news relating to the
software or documentation that could affect its operation
or usability. An up-to-date version of this document
should always be consulted before installing this version
of FreeBSD.</p>
<p>This errata document for FreeBSD 4.7-RELEASE will be
maintained until the release of FreeBSD 4.8-RELEASE.</p>
</div>
</blockquote>
<div class="SECT1">
<hr />
<h1 class="SECT1"><a id="AEN15" name="AEN15">1
Introduction</a></h1>
<p>This errata document contains ``late-breaking news''
about FreeBSD 4.7-RELEASE. Before installing this version,
it is important to consult this document to learn about any
post-release discoveries or problems that may already have
been found and fixed.</p>
<p>Any version of this errata document actually distributed
with the release (for example, on a CDROM distribution)
will be out of date by definition, but other copies are
kept updated on the Internet and should be consulted as the
``current errata'' for this release. These other copies of
the errata are located at <a
href="http://www.FreeBSD.org/releases/"
target="_top">http://www.FreeBSD.org/releases/</a>, plus
any sites which keep up-to-date mirrors of this
location.</p>
<p>Source and binary snapshots of FreeBSD 4-STABLE also
contain up-to-date copies of this document (as of the time
of the snapshot).</p>
<p>For a list of all FreeBSD CERT security advisories, see
<a href="http://www.FreeBSD.org/security/"
target="_top">http://www.FreeBSD.org/security/</a> or <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/"
target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a>.</p>
</div>
<div class="SECT1">
<hr />
<h1 class="SECT1"><a id="AEN26" name="AEN26">2 Security
Advisories</a></h1>
<p>Buffer overflows in kadmind(8) and k5admin could
potentially cause the administrative server to execute
arbitrary code. Bugfix and workaround information can be
found in security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:40.kadmind.asc"
target="_top">FreeBSD-SA-02:40</a>.</p>
<p>Errors in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=smrsh&sektion=8&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">smrsh</span>(8)</span></a>, which
could allow users to circumvent restrictions on what
programs can be executed, were fixed in FreeBSD
4.7-RELEASE. Because the applicable security advisory (<a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:41.smrsh.asc"
target="_top">FreeBSD-SA-02:41</a>) was not issued after
the release, this fact was not included in the release
notes.</p>
<p>Buffer overflows in the DNS <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=resolver&sektion=3&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">resolver</span>(3)</span></a>, which
could cause some applications to fail, have been corrected.
This change was not mentioned in the release notes, as the
applicable security advisory (<a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:42.resolv.asc"
target="_top">FreeBSD-SA-02:42</a>) was not issued until
after the release.</p>
<p>Several vulnerabilities exist in the version of <b
class="APPLICATION">BIND</b> included with FreeBSD
4.7-RELEASE. More information, including bugfixes and
workaround suggestions, can be found in security advisory
<a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:43.bind.asc"
target="_top">FreeBSD-SA-02:43</a>.</p>
<p>A file descriptor leak in the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=fpathconf&sektion=2&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">fpathconf</span>(2)</span></a> system
call, can allow a local user to crash the system or cause a
privilege escalation. Bugfix information can be found in
security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:44.filedesc.asc"
target="_top">FreeBSD-SA-02:44</a>.</p>
<p>Remotely exploitable vulnerabilities in <b
class="APPLICATION">CVS</b> could allow an attacker to
execute arbitrary comands on a CVS server. More details can
be found in security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:01.cvs.asc"
target="_top">FreeBSD-SA-03:01</a>.</p>
<p>A timing-based attack on <b
class="APPLICATION">OpenSSL</b>, could allow a very
powerful attacker access to plaintext under certain
circumstances. This problem has been corrected in FreeBSD
4.8-RC with an upgrade to <b
class="APPLICATION">OpenSSL</b> 0.9.7. On supported
security fix branches, this problem has been corrected with
the import of <b class="APPLICATION">OpenSSL</b> 0.9.6i.
See security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:02.openssl.asc"
target="_top">FreeBSD-SA-03:02</a> for more details.</p>
<p>It may be possible to recover the shared secret key used
by the implementation of the ``syncookies'' feature. This
reduces its effectiveness in dealing with TCP SYN flood
denial-of-service attacks. Workaround information and fixes
are given in security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:03.syncookies.asc"
target="_top">FreeBSD-SA-03:03</a>.</p>
<p>Due to a buffer overflow in header parsing in <b
class="APPLICATION">sendmail</b>, a remote attacker can
create a specially-crafted message that may cause <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=sendmail&sektion=8&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">sendmail</span>(8)</span></a> to
execute arbitrary code with the privileges of the user
running it, typically <tt class="USERNAME">root</tt>. More
information, including pointers to patches, can be found in
security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:04.sendmail.asc"
target="_top">FreeBSD-SA-03:04</a>.</p>
<p>The XDR encoder/decoder does incorrect bounds-checking,
which could allow a remote attacker to cause a
denial-of-service. For bugfix information, see security
advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:05.xdr.asc"
target="_top">FreeBSD-SA-03:05</a>.</p>
</div>
<div class="SECT1">
<hr />
<h1 class="SECT1"><a id="AEN68" name="AEN68">3
Late-Breaking News</a></h1>
<p>Due to concerns over the licensing terms for the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=matcd&sektion=4&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">matcd</span>(4)</span></a> driver
uncovered late in FreeBSD 4.7-RELEASE's release cycle, the
<a
href="http://www.FreeBSD.org/cgi/man.cgi?query=matcd&sektion=4&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">matcd</span>(4)</span></a> driver was
removed. These issues are being addressed and this driver
may reappear in a future release of FreeBSD.</p>
<p>The <tt class="FILENAME">srelease</tt> distribution
contains object files for <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=sysinstall&sektion=8&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">sysinstall</span>(8)</span></a> in
the <tt class="FILENAME">release/sysinstall</tt> directory.
These files were generated during the release building
process but, for some reason, were not removed from the
distribution files. They are harmless.</p>
<p>The <a
href="http://www.FreeBSD.org/cgi/url.cgi?ports/databases/rdfdb/pkg-descr">
<tt class="FILENAME">databases/rdfdb</tt></a> and <a
href="http://www.FreeBSD.org/cgi/url.cgi?ports/mail/ssmtp/pkg-descr">
<tt class="FILENAME">mail/ssmtp</tt></a> packages included
in the 4.7-RELEASE package set cannot be installed
correctly. A workaround is to build and install these
programs using the Ports Collection.</p>
<p>The <a
href="http://www.FreeBSD.org/cgi/url.cgi?ports/net/gnomeicu/pkg-descr">
<tt class="FILENAME">net/gnomeicu</tt></a> package included
in the 4.7-RELEASE package set may not run correctly, due
to a missing dependency on the <a
href="http://www.FreeBSD.org/cgi/url.cgi?ports/net/gnet/pkg-descr">
<tt class="FILENAME">net/gnet</tt></a> package. To work
around this problem, install <a
href="http://www.FreeBSD.org/cgi/url.cgi?ports/net/gnet/pkg-descr">
<tt class="FILENAME">net/gnet</tt></a> either from a
package or the Ports Collection, preferably before
installing <a
href="http://www.FreeBSD.org/cgi/url.cgi?ports/net/gnomeicu/pkg-descr">
<tt class="FILENAME">net/gnomeicu</tt></a>.</p>
<p>The release notes for FreeBSD 4.7-RELEASE incorrectly
stated that the <tt class="OPTION">-J</tt> option to <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=xargs&sektion=1&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">xargs</span>(1)</span></a> is
deprecated. In fact, there are no plans to remove this
option.</p>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=ftpd&sektion=8&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">ftpd</span>(8)</span></a> has a bug
in its virtual hosting function triggered if <tt
class="FILENAME">/etc/ftphosts</tt> defines a virtual host
whose IP address can resolve back to a hostname. In that
case the daemon will be exiting on <tt
class="LITERAL">SIGSEGV</tt> (signal 11) if started from <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=inetd&sektion=8&manpath=FreeBSD+4.7-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">inetd</span>(8)</span></a>, or may
malfunction unpredictably if running stand-alone. This bug
has been fixed in FreeBSD 4.8-RC.</p>
</div>
</div>
<hr />
<p align="center"><small>This file, and other release-related
documents, can be downloaded from <a
href="http://snapshots.jp.FreeBSD.org/">http://snapshots.jp.FreeBSD.org/</a>.</small></p>
<p align="center"><small>For questions about FreeBSD, read the
<a href="http://www.FreeBSD.org/docs.html">documentation</a>
before contacting <<a
href="mailto:questions@FreeBSD.org">questions@FreeBSD.org</a>>.</small></p>
<p align="center"><small><small>All users of FreeBSD 4-STABLE
should subscribe to the <<a
href="mailto:stable@FreeBSD.org">stable@FreeBSD.org</a>>
mailing list.</small></small></p>
<p align="center">For questions about this documentation,
e-mail <<a
href="mailto:doc@FreeBSD.org">doc@FreeBSD.org</a>>.</p>
<br />
<br />
</body>
</html>
|