diff --git a/website/content/en/releases/11.4R/errata.adoc b/website/content/en/releases/11.4R/errata.adoc index 328d2baac7..969d34e778 100644 --- a/website/content/en/releases/11.4R/errata.adoc +++ b/website/content/en/releases/11.4R/errata.adoc @@ -1,96 +1,98 @@ --- title: "FreeBSD 11.4-RELEASE Errata" sidenav: download --- = FreeBSD 11.4-RELEASE Errata == Abstract This document lists errata items for FreeBSD 11.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 11.4-RELEASE will be maintained until FreeBSD 11.4-RELEASE reaches end-of-life. === Table of Contents * <> * <> * <> * <> * <> [[intro]] == Introduction This errata document contains "late-breaking news" about FreeBSD 11.4-RELEASE. Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of FreeBSD 11.4-STABLE also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/. [[security]] == Security Advisories [width="100%",cols="40%,30%,30%",options="header",] |=== |Advisory |Date |Topic |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:18.posix_spawnp.asc[FreeBSD-SA-20:18.posix_spawnp] |8 July 2020 |Buffer overflow |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:19.unbound.asc[FreeBSD-SA-20:19.unbound] |8 July 2020 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:20.ipv6.asc[FreeBSD-SA-20:20.ipv6] |8 July 2020 |Race condition and use-after-free |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:21.usb_net.asc[FreeBSD-SA-20:21.usb_net] |5 August 2020 |Memory corruption |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:22.sqlite.asc[FreeBSD-SA-20:22.sqlite] |5 August 2020 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:23.sendmsg.asc[FreeBSD-SA-20:23.sendmsg] |5 August 2020 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:24.ipv6.asc[FreeBSD-SA-20:24.ipv6] |2 September 2020 |Use-after-free bug |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:25.sctp.asc[FreeBSD-SA-20:25.sctp] |2 September 2020 |Use-after-free bug |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:26.dhclient.asc[FreeBSD-SA-20:26.dhclient] |2 September 2020 |Heap overflow |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:27.ure.asc[FreeBSD-SA-20:27.ure] |15 September 2020 |Packet-in-packet attack |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:28.bhyve_vmcs.asc[FreeBSD-SA-20:28.bhyve_vmcs] |15 September 2020 |Privilege escalation via VMCS |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:29.bhyve_svm.asc[FreeBSD-SA-20:29.bhyve_svm] |15 September 2020 |SVM guest escape |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:30.ftpd.asc[FreeBSD-SA-20:30.ftpd] |15 September 2020 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:31.icmp6.asc[FreeBSD-SA-20:31.icmp6] |1 December 2020 |Use-after-free in error message handling |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:32.rtsold.asc[FreeBSD-SA-20:32.rtsold] |1 December 2020 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-20:33.openssl.asc[FreeBSD-SA-20:33.openssl] |8 December 2020 |NULL-pointer dereference |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:01.fsdisclosure.asc[FreeBSD-SA-21:01.fsdisclosure] |29 January 2021 |Kernel stack disclosure |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:02.xenoom.asc[FreeBSD-SA-21:02.xenoom] |29 January 2021 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:03.pam_login_access.asc[FreeBSD-SA-21:03.pam_login_access] |24 February 2021 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:04.jail_remove.asc[FreeBSD-SA-21:04.jail_remove] |24 February 2021 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:05.jail_chdir.asc[FreeBSD-SA-21:05.jail_chdir] |24 February 2021 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:06.xen.asc[FreeBSD-SA-21:06.xen] |24 February 2021 |Resource leaks |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:08.vm.asc[FreeBSD-SA-21:08.vm] |6 April 2021 |Kernel memory disclosure |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:10.jail_mount.asc[FreeBSD-SA-21:10.jail_mount] |6 April 2021 |Privilege escalation |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:12.libradius.asc[FreeBSD-SA-21:12.libradius] |26 May 2021 |Denial of service +|https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:19.libcasper.asc[FreeBSD-EN-21:19.libcasper] |30 June 2021 |libcasper assertion failure +|https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:22.linux_futexasc[FreeBSD-EN-21:22.linux_futex] |30 June 2021 |Linux compatibility layer futex(2) system call vulnerability |=== [[errata]] == Errata Notices [width="100%",cols="40%,30%,30%",options="header",] |=== |Errata |Date |Topic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:15.mps.asc[FreeBSD-EN-20:15.mps] |8 July 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:17.linuxthread.asc[FreeBSD-EN-20:17.linuxthread] |2 September 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:18.getfsstat.asc[FreeBSD-EN-20:18.getfsstat] |2 September 2020 |Kernel panic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-20:20.tzdata.asc[FreeBSD-EN-20:20.tzdata] |1 December 2020 |Timezone database information update |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:01.tzdata.asc[FreeBSD-EN-21:01.tzdata] |29 January 2021 |Timezone database information update |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:02.extattr.asc[FreeBSD-EN-21:02.extattr] |29 January 2021 |UFS extattr corruption |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:05.libatomic.asc[FreeBSD-EN-21:05.libatomic] |29 January 2021 |Addition of atomic and bswap functions to libcompiler_rt |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:08.freebsd-update.asc[FreeBSD-EN-21:08.freebsd-update] |24 February 2021 |freebsd-update passwd regeneration |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:17.libradius.asc[FreeBSD-EN-21:17.libradius] |1 June 2021 |Incorrect validation in rad_get_attr(3) |=== [[open-issues]] == Open Issues * [2020-06-11] Source-based upgrades from FreeBSD 11.2 on the i386 architecture may fail to compile clang due to the amount of RAM consumed. + Adding `CFLAGS+=-O1` to `/etc/make.con+` or `/etc/src.conf` has been observed to work around the compile-time RAM exhaustion. + See https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=246274[PR 246274] for additional details. * [2020-06-16] The FreeBSD 11.4 release notes erroneously state the KDE desktop environment has been updated to version 5.8.4.1.19.12.3. The correct version is 5.18.4.1.19.12.3. [[late-news]] == Late-Breaking News * No late-breaking news. diff --git a/website/content/en/releases/12.2R/errata.adoc b/website/content/en/releases/12.2R/errata.adoc index 5db33d28cf..bc55c853df 100644 --- a/website/content/en/releases/12.2R/errata.adoc +++ b/website/content/en/releases/12.2R/errata.adoc @@ -1,113 +1,115 @@ --- title: "FreeBSD 12.2-RELEASE Errata" sidenav: download --- :release: 12.2-RELEASE :releaseNext: 12.3-RELEASE :releaseBranch: 12-STABLE = FreeBSD {release} Errata == Abstract This document lists errata items for FreeBSD {release}, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD {release} will be maintained until the release of FreeBSD {releaseNext}. == Table of Contents * <> * <> * <> * <> * <> [[intro]] == Introduction This errata document contains "late-breaking news" about FreeBSD {release} Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of FreeBSD {releaseBranch} also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/. [[security]] == Security Advisories [width="100%",cols="40%,30%,30%",options="header",] |=== |Advisory |Date |Topic |link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:31.icmp6.asc[FreeBSD-SA-20:31.icmp6] |1 December 2020 |Use-after-free in error message handling |link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:32.rtsold.asc[FreeBSD-SA-20:32.rtsold] |1 December 2020 |Multiple vulnerabilities |link:https://www.freebsd.org/security/advisories/FreeBSD-SA-20:33.openssl.asc[FreeBSD-SA-20:33.openssl] |8 December 2020 |NULL pointer de-reference |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:01.fsdisclosure.asc[FreeBSD-SA-21:01.fsdisclosure] |29 January 2021 |Kernel stack disclosure |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:02.xenoom.asc[FreeBSD-SA-21:02.xenoom] |29 January 2021 |Kernel panic |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:03.pam_login_access.asc[FreeBSD-SA-21:03.pam_login_access] |24 February 2021 |Privilege escalation |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:04.jail_remove.asc[FreeBSD-SA-21:04.jail_remove] |24 February 2021 |Privilege escalation |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:05.jail_chdir.asc[FreeBSD-SA-21:05.jail_chdir] |24 February 2021 |Privilege escalation |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:06.xen.asc[FreeBSD-SA-21:06.xen] |24 February 2021 |Resource leaks |link:https://www.freebsd.org/security/advisories/FreeBSD-SA-21:07.openssl.asc[FreeBSD-SA-21:07.openssl] |25 March 2021 |Multiple vulnerabilities |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:08.vm.asc[FreeBSD-SA-21:08.vm] |6 April 2021 |Kernel memory disclosure |link:https://www.freebsd.org/security/advisories/FreeBSD-SA-21:09.accept_filter.asc[FreeBSD-SA-21:09.accept_filter] |6 April 2021 |Privilege escalation or memory disclosure |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:10.jail_mount.asc[FreeBSD-SA-21:10.jail_mount] |6 April 2021 |Privilege escalation |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:11.smap.asc[FreeBSD-SA-21:11.smap] |26 May 2021 |Mitigation bypass |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:12.libradius.asc[FreeBSD-SA-21:12.libradius] |26 May 2021 |Denial of service |=== [[errata]] == Errata Notices [width="100%",cols="40%,30%,30%",options="header",] |=== |Errata |Date |Topic |link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:19.audit.asc[FreeBSD-EN-20:19.audit] |1 December 2020 |execve/fexecve system call auditing |link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:20.tzdata.asc[FreeBSD-EN-20:20.tzdata] |1 December 2020 |Timezone database information update |link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:21.ipfw.asc[FreeBSD-EN-20:21.ipfw] |1 December 2020 |Uninitialized variable |link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:22.callout.asc[FreeBSD-EN-20:22.callout] |1 December 2020 |Race condition in callout CPU migration |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:01.tzdata.asc[FreeBSD-EN-21:01.tzdata] |29 January 2021 |Timezone database information update |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:03.vnet.asc[FreeBSD-EN-21:03.vnet] |29 January 2021 |Panic when destroying VNET and epair simultaneously |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:04.zfs.asc[FreeBSD-EN-21:04.zfs] |29 January 2021 |zfs recv fails to propagate snapshot deletion |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:06.microcode.asc[FreeBSD-EN-21:06.microcode] |24 February 2021 |Boot-time microcode loading causes a boot hang |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:07.caroot.asc[FreeBSD-EN-21:07.caroot] |24 February 2021 |Root certificate bundle update |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:08.freebsd-update.asc[FreeBSD-EN-21:08.freebsd-update] |24 February 2021 |freebsd-update passwd regeneration |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:09.pf.asc[FreeBSD-EN-21:09.pf] |6 April 2021 |net.pf.request_maxcount not settable from loader.conf(5) |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:10.lldb.asc[FreeBSD-EN-21:10.lldb] |6 April 2021 |lldb abort on print command |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:11.aesni.asc[FreeBSD-EN-21:11.aesni] |26 May 2021 |Race condition in aesni(4) encrypt-then-auth operations |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:12.divert.asc[FreeBSD-EN-21:12.divert] |26 May 2021 |Kernel double free when transmitting on a divert socket |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:14.pms.asc[FreeBSD-EN-21:14.pms] |26 May 2021 |pms(4) data corruption |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:16.bc.asc[FreeBSD-EN-21:16.bc] |26 May 2021 |dc update |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:17.libradius.asc[FreeBSD-EN-21:17.libradius] |1 June 2021 |Incorrect validation in rad_get_attr(3) +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:19.libcasper.asc[FreeBSD-EN-21:19.libcasper] |30 June 2021 |libcasper assertion failure +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:22.linux_futexasc[FreeBSD-EN-21:22.linux_futex] |30 June 2021 |Linux compatibility layer futex(2) system call vulnerability |=== [[open-issues]] == Open Issues [2020-10-27] A regression in man:ipfw[8] was discovered where packets are not properly forwarded with multiple IP addresses bound to the same interface. This issue had been corrected in link:https://www.freebsd.org/security/advisories/FreeBSD-EN-20:21.ipfw.asc[FreeBSD-EN-20:21.ipfw]. See link:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250434[PR 250434] for additional details. [2020-10-27] A regression with man:zfs[8] send/recv was discovered where ZFS snapshots are not properly deleted under certain conditions. An Errata Notice is planned for 12.2-RELEASE. See link:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249438[PR 249438] for additional details. [2020-10-27] A regression was discovered with the FreeBSD/armv7 BEAGLEBONE images where SD card I/O takes an excessive amount of time. As such, there are no BEAGLEBONE images for this release. [[late-news]] == Late-Breaking News [2020-10-27] A very late issue was discovered with the [.filename]#x11/gdm# package included on the amd64 and i386 DVD installer which causes GDM to fail to start properly. Those installing GNOME as a new installation from the DVD should upgrade [.filename]#x11/gdm# from the upstream man:pkg[8] mirrors after installation. Those installing GNOME on a new installation from the upstream man:pkg[8] mirrors, or upgrading from a previous FreeBSD release should not experience any issues. [2020-11-11] Due to slight changes to the ABI and KBI between FreeBSD 12.1 and FreeBSD 12.2, it is important to note that certain third-party kernel modules may need to be rebuilt locally, until FreeBSD 12.1 reaches end of life. Of note, this includes, but is not limited to, [.filename]#graphics/\*-kmod#, [.filename]#net/*-kmod#, and possibly others that are too extensive to list. diff --git a/website/content/en/releases/13.0R/errata.adoc b/website/content/en/releases/13.0R/errata.adoc index 46b67bb72b..f8a6130d1f 100644 --- a/website/content/en/releases/13.0R/errata.adoc +++ b/website/content/en/releases/13.0R/errata.adoc @@ -1,76 +1,81 @@ --- title: "FreeBSD 13.0-RELEASE Errata" sidenav: download --- :release: 13.0-RELEASE :releaseNext: 13.1-RELEASE :releaseBranch: 13-STABLE = FreeBSD {release} Errata == Abstract This document lists errata items for FreeBSD {release}, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD {release} will be maintained until the release of FreeBSD {releaseNext}. == Table of Contents * <> * <> * <> * <> * <> [[intro]] == Introduction This errata document contains "late-breaking news" about FreeBSD {release} Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of FreeBSD {releaseBranch} also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/. [[security]] == Security Advisories [width="100%",cols="40%,30%,30%",options="header",] |=== |Advisory |Date |Topic |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:11.smap.asc[FreeBSD-SA-21:11.smap] |26 May 2021 |Mitigation bypass |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-21:12.libradius.asc[FreeBSD-SA-21:12.libradius] |26 May 2021 |Denial of service |=== [[errata]] == Errata Notices [width="100%",cols="40%,30%,30%",options="header",] |=== |Errata |Date |Topic |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:12.divert.asc[FreeBSD-EN-21:12.divert] |26 May 2021 |Kernel double free when transmitting on a divert socket |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:13.mpt.asc[FreeBSD-EN-21:13.mpt] |26 May 2021 |mpt(4) I/O errors with a large maxphys value |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:14.pms.asc[FreeBSD-EN-21:14.pms] |26 May 2021 |pms(4) data corruption |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:15.virtio.asc[FreeBSD-EN-21:15.virtio] |26 May 2021 |virtio(4) device probing fails |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:16.bc.asc[FreeBSD-EN-21:16.bc] |26 May 2021 |dc update |link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:17.libradius.asc[FreeBSD-EN-21:17.libradius] |1 June 2021 |Incorrect validation in rad_get_attr(3) +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:18.libc++.asc[FreeBSD-EN-21:18.libc++] |30 June 2021 |Missing C++20 headers in libc++ +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:19.libcasper.asc[FreeBSD-EN-21:19.libcasper] |30 June 2021 |libcasper assertion failure +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:20.vlan.asc[FreeBSD-EN-21:20.vlan] |30 June 2021 |Missing backwards compatibility in vlan(4) +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:21.ipfw.asc[FreeBSD-EN-21:21.ipfw] |30 June 2021 |Kernel panic with ipfw link-layer filtering enabled +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-21:22.linux_futexasc[FreeBSD-EN-21:22.linux_futex] |30 June 2021 |Linux compatibility layer futex(2) system call vulnerability |=== [[open-issues]] == Open Issues No open issues. [[late-news]] == Late-Breaking News [2021-04-05] A very late issue was discovered in the [.filename]#/usr/bin/dc# program. The "P" command does not correctly pop the top of stack value and this will break complex scripts that continue after printing a result. The [.filename]#/usr/bin/bc# program is not affected, since it does not depend on dc as its execution engine. [2021-04-14] An issue was discovered where during an upgrade, when the kernel is new but [.filename]#/sbin/ifconfig# is still the previous version, VLAN interfaces are configured with an invalid ethernet protocol type. This causes the VLAN interfaces to send invalid traffic, resulting in non-functional networking. Once the updated [.filename]#/sbin/ifconfig# binary is installed, VLANs are created correctly. When depending on network access via VLANs during the upgrade, it is suggested to install the new world (run the second `freebsd-update install`) before rebooting.