diff --git a/website/content/en/releases/11.4R/errata.adoc b/website/content/en/releases/11.4R/errata.adoc index 57a6fa8c5f..46c025e80d 100644 --- a/website/content/en/releases/11.4R/errata.adoc +++ b/website/content/en/releases/11.4R/errata.adoc @@ -1,81 +1,81 @@ --- title: "FreeBSD 11.4-RELEASE Errata" sidenav: download --- = FreeBSD 11.4-RELEASE Errata == Abstract This document lists errata items for FreeBSD 11.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 11.4-RELEASE will be maintained until FreeBSD 11.4-RELEASE reaches end-of-life. === Table of Contents * <> * <> * <> * <> * <> [[intro]] == Introduction This errata document contains "late-breaking news" about FreeBSD 11.4-RELEASE. Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of FreeBSD 11.4-STABLE also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/. [[security]] == Security Advisories [width="100%",cols="40%,30%,30%",options="header",] |=== |Advisory |Date |Topic |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:18.posix_spawnp.asc[FreeBSD-SA-20:18.posix_spawnp] |8 July 2020 |Buffer overflow |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:19.unbound.asc[FreeBSD-SA-20:19.unbound] |8 July 2020 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:20.ipv6.asc[FreeBSD-SA-20:20.ipv6] |8 July 2020 |Race condition and use-after-free |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:21.usb_net.asc[FreeBSD-SA-20:21.usb_net] |5 August 2020 |Memory corruption |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:22.sqlite.asc[FreeBSD-SA-20:22.sqlite] |5 August 2020 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:23.sendmsg.asc[FreeBSD-SA-20:23.sendmsg] |5 August 2020 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:24.ipv6.asc[FreeBSD-SA-20:24.ipv6] |2 September 2020 |Use-after-free bug |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:25.sctp.asc[FreeBSD-SA-20:25.sctp] |2 September 2020 |Use-after-free bug |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:26.dhclient.asc[FreeBSD-SA-20:26.dhclient] |2 September 2020 |Heap overflow |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:27.ure.asc[FreeBSD-SA-20:27.ure] |15 September 2020 |Packet-in-packet attack |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:28.bhyve_vmcs.asc[FreeBSD-SA-20:28.bhyve_vmcs] |15 September 2020 |Privilege escalation via VMCS |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:29.bhyve_svm.asc[FreeBSD-SA-20:29.bhyve_svm] |15 September 2020 |SVM guest escape |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:30.ftpd.asc[FreeBSD-SA-20:30.ftpd] |15 September 2020 |Privilege escalation -|https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:31.icmp6.asc[FreeBSD-SA-20:31.icmp6] |1 December 2019 |Use-after-free in error message handling -|https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:32.rtsold.asc[FreeBSD-SA-20:32.rtsold] |1 December 2019 |Multiple vulnerabilities +|https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:31.icmp6.asc[FreeBSD-SA-20:31.icmp6] |1 December 2020 |Use-after-free in error message handling +|https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:32.rtsold.asc[FreeBSD-SA-20:32.rtsold] |1 December 2020 |Multiple vulnerabilities |=== [[errata]] == Errata Notices [width="100%",cols="40%,30%,30%",options="header",] |=== |Errata |Date |Topic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:15.mps.asc[FreeBSD-EN-20:15.mps] |8 July 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:17.linuxthread.asc[FreeBSD-EN-20:17.linuxthread] |2 September 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:18.getfsstat.asc[FreeBSD-EN-20:18.getfsstat] |2 September 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:20.tzdata.asc[FreeBSD-EN-20:20.tzdata] |1 December 2020 |Timezone database information update |=== [[open-issues]] == Open Issues * [2020-06-11] Source-based upgrades from FreeBSD 11.2 on the i386 architecture may fail to compile clang due to the amount of RAM consumed. + Adding `CFLAGS+=-O1` to `/etc/make.con+` or `/etc/src.conf` has been observed to work around the compile-time RAM exhaustion. + See https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246274[PR 246274] for additional details. * [2020-06-16] The FreeBSD 11.4 release notes erroneously state the KDE desktop environment has been updated to version 5.8.4.1.19.12.3. The correct version is 5.18.4.1.19.12.3. [[late-news]] == Late-Breaking News * No late-breaking news. diff --git a/website/content/en/releases/12.2R/errata.adoc b/website/content/en/releases/12.2R/errata.adoc index 286631d3f4..9ee830c305 100644 --- a/website/content/en/releases/12.2R/errata.adoc +++ b/website/content/en/releases/12.2R/errata.adoc @@ -1,97 +1,90 @@ --- title: "FreeBSD 12.2-RELEASE Errata" sidenav: download --- :release: 12.2-RELEASE :releaseNext: 12.3-RELEASE :releaseBranch: 12-STABLE = FreeBSD {release} Errata == Abstract This document lists errata items for FreeBSD {release}, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD {release} will be maintained until the release of FreeBSD {releaseNext}. == Table of Contents * <> * <> * <> * <> * <> [[intro]] == Introduction This errata document contains "late-breaking news" about FreeBSD {release} Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of FreeBSD {releaseBranch} also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/. [[security]] == Security Advisories [width="100%",cols="40%,30%,30%",options="header",] |=== |Advisory |Date |Topic - -|link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:31.icmp6.asc[FreeBSD-SA-20:31.icmp6] |1 December 2019 |Use-after-free in error message handling - -|link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:32.rtsold.asc[FreeBSD-SA-20:32.rtsold] |1 December 2019 |Multiple vulnerabilities - -|link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:33.openssl.asc[FreeBSD-SA-20:33.openssl] |8 December 2019 |NULL pointer de-reference +|link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:31.icmp6.asc[FreeBSD-SA-20:31.icmp6] |1 December 2020 |Use-after-free in error message handling +|link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:32.rtsold.asc[FreeBSD-SA-20:32.rtsold] |1 December 2020 |Multiple vulnerabilities +|link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:33.openssl.asc[FreeBSD-SA-20:33.openssl] |8 December 2020 |NULL pointer de-reference |=== [[errata]] == Errata Notices [width="100%",cols="40%,30%,30%",options="header",] |=== |Errata |Date |Topic - |link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:19.audit.asc[FreeBSD-EN-20:19.audit] |1 December 2020 |execve/fexecve system call auditing - |link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:20.tzdata.asc[FreeBSD-EN-20:20.tzdata] |1 December 2020 |Timezone database information update - |link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:21.ipfw.asc[FreeBSD-EN-20:21.ipfw] |1 December 2020 |Uninitialized variable - |link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:22.callout.asc[FreeBSD-EN-20:22.callout] |1 December 2020 |Race condition in callout CPU migration |=== [[open-issues]] == Open Issues [2020-10-27] A regression in man:ipfw[8] was discovered where packets are not properly forwarded with multiple IP addresses bound to the same interface. This issue had been corrected in link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:21.ipfw.asc[FreeBSD-EN-20:21.ipfw]. See link:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250434[PR 250434] for additional details. [2020-10-27] A regression with man:zfs[8] send/recv was discovered where ZFS snapshots are not properly deleted under certain conditions. An Errata Notice is planned for 12.2-RELEASE. See link:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249438[PR 249438] for additional details. [2020-10-27] A regression was discovered with the FreeBSD/armv7 BEAGLEBONE images where SD card I/O takes an excessive amount of time. As such, there are no BEAGLEBONE images for this release. [[late-news]] == Late-Breaking News [2020-10-27] A very late issue was discovered with the [.filename]#x11/gdm# package included on the amd64 and i386 DVD installer which causes GDM to fail to start properly. Those installing GNOME as a new installation from the DVD should upgrade [.filename]#x11/gdm# from the upstream man:pkg[8] mirrors after installation. Those installing GNOME on a new installation from the upstream man:pkg[8] mirrors, or upgrading from a previous FreeBSD release should not experience any issues. [2020-11-11] Due to slight changes to the ABI and KBI between FreeBSD 12.1 and FreeBSD 12.2, it is important to note that certain third-party kernel modules may need to be rebuilt locally, until FreeBSD 12.1 reaches end of life. Of note, this includes, but is not limited to, [.filename]#graphics/\*-kmod#, [.filename]#net/*-kmod#, and possibly others that are too extensive to list.