diff --git a/website/content/en/releases/11.4R/errata.adoc b/website/content/en/releases/11.4R/errata.adoc index 62084643f0..b3d0f6a05c 100644 --- a/website/content/en/releases/11.4R/errata.adoc +++ b/website/content/en/releases/11.4R/errata.adoc @@ -1,98 +1,102 @@ --- title: "FreeBSD 11.4-RELEASE Errata" sidenav: download --- = FreeBSD 11.4-RELEASE Errata == Abstract This document lists errata items for FreeBSD 11.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 11.4-RELEASE will be maintained until FreeBSD 11.4-RELEASE reaches end-of-life. === Table of Contents * <> * <> * <> * <> * <> [[intro]] == Introduction This errata document contains "late-breaking news" about FreeBSD 11.4-RELEASE. Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of FreeBSD 11.4-STABLE also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/. [[security]] == Security Advisories [width="100%",cols="40%,30%,30%",options="header",] |=== |Advisory |Date |Topic |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:18.posix_spawnp.asc[FreeBSD-SA-20:18.posix_spawnp] |8 July 2020 |Buffer overflow |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:19.unbound.asc[FreeBSD-SA-20:19.unbound] |8 July 2020 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:20.ipv6.asc[FreeBSD-SA-20:20.ipv6] |8 July 2020 |Race condition and use-after-free |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:21.usb_net.asc[FreeBSD-SA-20:21.usb_net] |5 August 2020 |Memory corruption |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:22.sqlite.asc[FreeBSD-SA-20:22.sqlite] |5 August 2020 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:23.sendmsg.asc[FreeBSD-SA-20:23.sendmsg] |5 August 2020 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:24.ipv6.asc[FreeBSD-SA-20:24.ipv6] |2 September 2020 |Use-after-free bug |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:25.sctp.asc[FreeBSD-SA-20:25.sctp] |2 September 2020 |Use-after-free bug |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:26.dhclient.asc[FreeBSD-SA-20:26.dhclient] |2 September 2020 |Heap overflow |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:27.ure.asc[FreeBSD-SA-20:27.ure] |15 September 2020 |Packet-in-packet attack |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:28.bhyve_vmcs.asc[FreeBSD-SA-20:28.bhyve_vmcs] |15 September 2020 |Privilege escalation via VMCS |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:29.bhyve_svm.asc[FreeBSD-SA-20:29.bhyve_svm] |15 September 2020 |SVM guest escape |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:30.ftpd.asc[FreeBSD-SA-20:30.ftpd] |15 September 2020 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:31.icmp6.asc[FreeBSD-SA-20:31.icmp6] |1 December 2020 |Use-after-free in error message handling |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:32.rtsold.asc[FreeBSD-SA-20:32.rtsold] |1 December 2020 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:33.openssl.asc[FreeBSD-SA-20:33.openssl] |8 December 2020 |NULL-pointer dereference |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:01.fsdisclosure.asc[FreeBSD-SA-21:01.fsdisclosure] |29 January 2021 |Kernel stack disclosure |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:02.xenoom.asc[FreeBSD-SA-21:02.xenoom] |29 January 2021 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:03.pam_login_access.asc[FreeBSD-SA-21:03.pam_login_access] |24 February 2021 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:04.jail_remove.asc[FreeBSD-SA-21:04.jail_remove] |24 February 2021 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:05.jail_chdir.asc[FreeBSD-SA-21:05.jail_chdir] |24 February 2021 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:06.xen.asc[FreeBSD-SA-21:06.xen] |24 February 2021 |Resource leaks |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:08.vm.asc[FreeBSD-SA-21:08.vm] |6 April 2021 |Kernel memory disclosure |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:10.jail_mount.asc[FreeBSD-SA-21:10.jail_mount] |6 April 2021 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:12.libradius.asc[FreeBSD-SA-21:12.libradius] |26 May 2021 |Denial of service +|https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:13.bhyve.asc[FreeBSD-SA-21:13.bhyve] |24 August 2021 |Missing error handling in bhyve(8) device models +|https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:14.ggatec.asc[FreeBSD-SA-21:14.ggatec] |24 August 2021 |Remote code execution in ggatec(8) +|https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:15.libfetch.asc[FreeBSD-SA-21:15.libfetch] |24 August 2021 |libfetch out of bounds read +|https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:17.openssl.asc[FreeBSD-SA-21:17.openssl] |24 August 2021 |Multiple vulnerabilities in OpenSSL |=== [[errata]] == Errata Notices [width="100%",cols="40%,30%,30%",options="header",] |=== |Errata |Date |Topic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:15.mps.asc[FreeBSD-EN-20:15.mps] |8 July 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:17.linuxthread.asc[FreeBSD-EN-20:17.linuxthread] |2 September 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:18.getfsstat.asc[FreeBSD-EN-20:18.getfsstat] |2 September 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:20.tzdata.asc[FreeBSD-EN-20:20.tzdata] |1 December 2020 |Timezone database information update |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:01.tzdata.asc[FreeBSD-EN-21:01.tzdata] |29 January 2021 |Timezone database information update |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:02.extattr.asc[FreeBSD-EN-21:02.extattr] |29 January 2021 |UFS extattr corruption |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:05.libatomic.asc[FreeBSD-EN-21:05.libatomic] |29 January 2021 |Addition of atomic and bswap functions to libcompiler_rt |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:08.freebsd-update.asc[FreeBSD-EN-21:08.freebsd-update] |24 February 2021 |freebsd-update passwd regeneration |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:17.libradius.asc[FreeBSD-EN-21:17.libradius] |1 June 2021 |Incorrect validation in rad_get_attr(3) |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:19.libcasper.asc[FreeBSD-EN-21:19.libcasper] |30 June 2021 |libcasper assertion failure |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:22.linux_futex.asc[FreeBSD-EN-21:22.linux_futex] |30 June 2021 |Linux compatibility layer futex(2) system call vulnerability |=== [[open-issues]] == Open Issues * [2020-06-11] Source-based upgrades from FreeBSD 11.2 on the i386 architecture may fail to compile clang due to the amount of RAM consumed. + Adding `CFLAGS+=-O1` to `/etc/make.con+` or `/etc/src.conf` has been observed to work around the compile-time RAM exhaustion. + See https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246274[PR 246274] for additional details. * [2020-06-16] The FreeBSD 11.4 release notes erroneously state the KDE desktop environment has been updated to version 5.8.4.1.19.12.3. The correct version is 5.18.4.1.19.12.3. [[late-news]] == Late-Breaking News * No late-breaking news.