Index: head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html =================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html (revision 49627) +++ head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html (revision 49628) @@ -1,153 +1,155 @@ -FreeBSD 10.3-RELEASE Errata

FreeBSD 10.3-RELEASE Errata

The FreeBSD Project

FreeBSD 10.3-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use of these trademarks by its members.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the ® symbol.

Last modified on 2016-03-07 10:56:38Z by hrs.
Abstract

This document lists errata items for FreeBSD 10.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 10.3-RELEASE will be maintained until the release of FreeBSD 10.3-RELEASE.


1. Introduction

This errata document contains late-breaking news about FreeBSD 10.3-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.

Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the current errata for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 10.3-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).

For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.

2. Security Advisories

AdvisoryDateTopic
FreeBSD-SA-16:09.ntp29 April 2016

Multiple ntp vulnerabilities.

FreeBSD-SA-16:17.openssl29 April 2016

Multiple OpenSSL vulnerabilities.

FreeBSD-SA-16:18.atkbd17 May 2016

Keyboard driver buffer overflow

FreeBSD-SA-16:19.sendmsg17 May 2016

Incorrect argument handling in sendmsg(2)

FreeBSD-SA-16:20.linux31 May 2016

Kernel stack disclosure in Linux compatibility layer

FreeBSD-SA-16:21.43bsd31 May 2016

Kernel stack disclosure in 4.3BSD compatibility layer

FreeBSD-SA-16:22.libarchive31 May 2016

Absolute path traversal vulnerability

FreeBSD-SA-16:23.libarchive31 May 2016

Absolute path traversal vulnerability

FreeBSD-SA-16:24.ntp3 June 2016

Multiple ntp vulnerabilties

FreeBSD-SA-16:25.bspatch25 July 2016

heap overflow vulnerability

FreeBSD-SA-16:26.openssl23 September 2016

Multiple vulnerabilities

FreeBSD-SA-16:27.openssl26 September 2016

Regression in OpenSSL - suite

FreeBSD-SA-16:29.bspatch10 October 2016

Heap overflow vulnerability

FreeBSD-SA-16:30.portsnap10 October 2016

Multiple vulnerabilities

FreeBSD-SA-16:31.libarchive10 October 2016

Multiple vulnerabilities

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-16:06.libc4 May 2016

Performance regression in libc + suite

FreeBSD-SA-16:29.bspatch10 October 2016

Heap overflow vulnerability

FreeBSD-SA-16:30.portsnap10 October 2016

Multiple vulnerabilities

FreeBSD-SA-16:31.libarchive10 October 2016

Multiple vulnerabilities

FreeBSD-SA-16:33.openssh2 November 2016

Remote Denial of Service + vulnerability

FreeBSD-SA-16:35.openssl2 November 2016

Remote Denial of Service + vulnerability

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-16:06.libc4 May 2016

Performance regression in libc hash(3)

FreeBSD-EN-16:07.ipi4 May 2016

Excessive latency in x86 IPI delivery

FreeBSD-EN-16:08.zfs4 May 2016

Memory leak in ZFS

FreeBSD-EN-16:09.freebsd-update25 July 2016

Fix freebsd-update(8) support of FreeBSD 11.0-RELEASE

FreeBSD-EN-16:10.dhclient11 August 2016

Better handle unknown options received from aDHCP server

FreeBSD-EN-16:11.vmbus11 August 2016

Avoid using spin locks for channel message locks

FreeBSD-EN-16:12.hv_storvsc11 August 2016

Enable INQUIRY result check only on Windows 10 host systems

FreeBSD-EN-16:13.vmbus11 August 2016

Register time counter early enough for TSC freq calibration

FreeBSD-EN-16:14.hv_storvsc11 August 2016

Disable incorrect callout in hv_storvsc(4)

FreeBSD-EN-16:15.vmbus11 August 2016

Better handle the GPADL setup failure in Hyper-V

FreeBSD-EN-16:16.hv_storvsc11 August 2016

Fix SCSI INQUIRY checks and error handling

FreeBSD-EN-16:17.vm25 October 2016

Several virtual memory issues

4. Open Issues

  • FreeBSD/i386 10.3-RELEASE running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a specific version of VirtualBox or host operating system.

    It has been reported that instability may be present on virtual machines running on other hypervisors, such as Xen or KVM.

    It causes various errors and makes FreeBSD quite unstable. Although the cause is still unclear, disabling unmapped I/O works as a workaround. To disable it, choose Escape to loader prompt in the boot menu and enter the following lines from loader(8) prompt, after an OK:

    set vfs.unmapped_buf_allowed=0
     boot

    Note that the following line has to be added to /boot/loader.conf after a boot. It disables unmapped I/O at every boot:

    vfs.unmapped_buf_allowed=0
  • FreeBSD/i386 10.3-RELEASE installed on ZFS may crash during boot when the ZFS pool mount is attempted while booting an unmodified GENERIC kernel.

    As described in /usr/src/UPDATING entry 20121223, rebuilding the kernel with options KSTACK_PAGES=4 has been observed to resolve the boot-time crash. This, however, is not an ideal solution for inclusion in the GENERIC kernel configuration, as increasing KSTACK_PAGES implicitly decreases available usermode threads in an environment that is already resource-starved.

    Taking into account the heavy resource requirements of ZFS, in addition to the i386-specific tuning requirements for general workloads, using ZFS with the FreeBSD/i386 GENERIC kernel is strongly discouraged.

    If installing FreeBSD/i386 on ZFS, it is possible to configure the system after installation to increase the KSTACK_PAGES.

    When prompted by bsdinstall(8) to perform additional post-installation configuration to the system, select [ YES ].

    This procedure requires the system sources available locally. If the System source code distribution was not selected during installation, it can be obtained using svnlite:

    # mkdir -p /usr/src
     # svnlite co svn://svn.freebsd.org/base/releng/10.2 /usr/src

    Build the kernel-toolchain required to rebuild the kernel:

    # make -C /usr/src kernel-toolchain

    Next, create a kernel configuration file to increase the KSTACK_PAGES option:

    # printf "include GENERIC\noptions KSTACK_PAGES=4\n" > /usr/src/sys/i386/conf/ZFS

    Then build and install the ZFS kernel:

    # make -C /usr/src buildkernel KERNCONF=ZFS
     # make -C /usr/src installkernel KERNCONF=ZFS

    Warning:

    It is extremely important to take note that, by default, freebsd-update(8) will install the GENERIC kernel configuration, and as such, freebsd-update(8) consumers are strongly encouraged to avoid FreeBSD-provided kernel binary upgrades with such configurations.

  • Due to an incompatibility between bsdconfig(8) and pkg(8), packages included on the FreeBSD dvd installer will not be recognized by bsdconfig(8).

    To install packages from the dvd1.iso installer, create the /dist target directory, and manually mount the dvd1.iso ISO:

    # mkdir -p /dist
     # mount -t cd9660 /dev/cd0 /dist

    Note:

    Be sure to use the correct /dev device path for the dvd1.iso ISO installer.

    Next, set REPOS_DIR to the path of the repos/ directory within the installer so pkg(8) will use the correct repository metadata.

    If using sh(1):

    # export REPOS_DIR=/dist/packages/repos

    If using csh(1):

    # setenv REPOS_DIR /dist/packages/repos

    Note:

    Keep in mind that REPOS_DIR will need to be set again after the current shell session is terminated, if continuing to use the packages provided on the dvd1.iso installer.

    Finally, bootstrap pkg(8) from the ISO, and install required packages:

    # pkg bootstrap
     # pkg install xorg-server xorg gnome3 [...]
  • An issue was discovered where the netstat(1) -s option will cause a segmentation fault on systems with IPSEC compiled into the kernel. The issue was resolved in the stable/10 branch, and an Errata Notice is planned after 10.3-RELEASE is released.

    [2015-08-19] Resolved as FreeBSD-EN-15:12.

  • An issue was discovered that causes make(1) to generate noisy output when doing source-based upgrades from FreeBSD 9.3 and earlier. The issue was reported in PR 202277, and after investigation and determining the issue does not cause source-based upgrades to fail, a post-release Errata Notice is planned.

    [2015-08-19] Resolved as FreeBSD-EN-15:11.

  • An issue with FreeBSD virtual machines with vagrant was discovered that affects the VirtualBox where the virtual machine will not start on the initial boot invoked with vagrant up.

    The issue is due to the virtual machine MAC being unset, as FreeBSD does not provide a default Vagrantfile.

    It has been observed, however, that a subsequent invocation of vagrant up will allow the virtual machine to successfully boot, allowing access via vagrant ssh.

  • [2015-08-16] An error was discovered in the release notes for FreeBSD 10.3-RELEASE regarding the drm device driver. The entry for r282199 states the driver was updated to match the version Linux® 3.8.13 version, however the entry should have noted the change affects device-independent code, and does not bring the drm driver fully in line with the stated Linux® version.

5. Late-Breaking News

No news.

This file, and other release-related documents, can be downloaded from https://www.FreeBSD.org/snapshots/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 10.3-STABLE should subscribe to the <stable@FreeBSD.org> mailing list.

For questions about this documentation, e-mail <doc@FreeBSD.org>.

\ No newline at end of file Index: head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html =================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html (revision 49627) +++ head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html (revision 49628) @@ -1,137 +1,138 @@ -FreeBSD 11.0-RELEASE Errata

FreeBSD 11.0-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of +FreeBSD 11.0-RELEASE Errata

FreeBSD 11.0-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use of these trademarks by its members.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the ® symbol.

Last modified on 2016-10-21 19:23:51Z by gjb.
Abstract

This document lists errata items for FreeBSD 11.0-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 11.0-RELEASE will be maintained until the release of FreeBSD 11.1-RELEASE.


1. Introduction

This errata document contains late-breaking news about FreeBSD 11.0-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.

Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the current errata for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 11.0-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).

For a list of all FreeBSD CERT security advisories, see - https://www.FreeBSD.org/security/.

2. Security Advisories

AdvisoryDateTopic
FreeBSD-SA-16:32.bhyve25 October 2016

Privilege escalation vulnerability

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-16:18.loader25 October 2016

Loader may hang during boot

4. Open Issues

2. Security Advisories

AdvisoryDateTopic
FreeBSD-SA-16:32.bhyve25 October 2016

Privilege escalation vulnerability

FreeBSD-SA-16:33.openssh2 November 2016

Remote Denial of Service + vulnerability

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-16:18.loader25 October 2016

Loader may hang during boot

4. Open Issues

  • An issue was discovered with Amazon® EC2™ images which would cause the virtual machine to hang during boot when upgrading from previous FreeBSD versions. New EC2™ installations are not affected, but existing installations running earlier releases are advised to wait until the issue is resolved in an Errata Notice before upgrading. An Errata Notice to address this is planned following the release.

  • FreeBSD/i386 installed on ZFS may crash during boot when the ZFS pool mount is attempted while booting an unmodified GENERIC kernel.

    A system tunable has been added as of revision r286584 to make the kern.kstack_pages tunable configurable without recompiling the kernel.

    To mitigate system crashes with such configurations, chose Escape to loader prompt in the boot menu and enter the following lines from loader(8) prompt, after an OK:

    set kern.kstack_pages=4
     boot

    Add this line to /boot/loader.conf for the change to persist across reboots:

    kern.kstack_pages=4
  • A bug was diagnosed in interaction of the pmap_activate() function and TLB shootdown IPI handler on amd64 systems which have PCID features but do not implement the INVPCID instruction. On such machines, such as SandyBridge™ and IvyBridge™ microarchitectures, set the loader tunable vm.pmap.pcid_enabled=0 during boot:

    set vm.pmap.pcid_enabled=0
     boot

    Add this line to /boot/loader.conf for the change to persist across reboots:

    To check if the system is affected, check dmesg(8) for PCID listed in the "Features2", and absence of INVPCID in the "Structured Extended Features". If the PCID feature is not present, or INVPCID is present, system is not affected.

    vm.pmap.pcid_enabled=0
  • The Release Notes erroneously states the WITH_SYSTEM_COMPILER src.conf(5) option is enabled by default, however this was disabled prior to the final release build.

  • The release announcement stated "Wireless support for 802.11n has been added." This was intended to state "Wireless support for 802.11n has been added for additional wireless network drivers."

  • Some release notes pertaining to the Cavium ThunderX platform (the FreeBSD/arm64 reference platform) were omitted:

    • Support for the Cavium Virtualized NIC ethernet driver has been added. [r289550] (Sponsored by Cavium)

    • Support for the GICv3 and ITS device drivers has been added. [r286919] (Sponsored by Cavium)

    • Support for PCI Enhanced Allocation support has been added. [r296308] (Sponsored by Cavium)

  • [2016-10-20] Several recent Dell systems fail to find a bootable disk when the system boots in Legacy/BIOS/CSM mode, the boot disk is partitioned with GPT, and the Active flag in the Protective MBR is not set. To work around this issue, either configure the system to boot in UEFI mode, or choose the "GPT + Active" scheme. [r293860]

  • [2016-10-21] Support for sha512 and skein checksumming has been added to the ZFS filesystem. This was not mentioned in the release notes.

    Systems being upgraded from earlier FreeBSD releases with ZFS will see a message in zpool status output noting the pool is not at the latest version, and some features may not be enabled. Additional instructions on how to update ZFS pools to the latest version and update the boot blocks for all boot drives in the pool will also be provided in the output.

    This information is also documented in /usr/src/UPDATING, which is included if the src component is selected during installation.

  • [2016-10-21] The size of the GPT enabled ZFS boot blocks (/boot/gptzfsboot) has increased past 64K. Systems upgraded from older releases may experience a problem where the size of the existing "freebsd-boot" partition is too small to hold the new gptzfsboot.

    Systems where the boot partition is immediately followed by the swap partition, such as those installed via bsdinstall(8), can resize the swap partition slightly using the gpart(8) resize command, so space can be reclaimed to increase the size of the freebsd-boot partition.

  • [2016-10-21] Due to a bug in earlier versions of clang(1) that is difficult to work around in the upgrade process, to upgrade the system from sources via buildworld to -CURRENT or 11.0-RELEASE, it is necessary to upgrade machines running 9.x to at least revision r286035, or machines running 10.x to revision r286033. Source-based upgrades from 10.3-RELEASE are not affected. This differs from the historical situation where one could generally upgrade from anywhere on earlier stable branches, so caution should be exercised.

5. Late-Breaking News

No news.

This file, and other release-related documents, can be downloaded from https://www.FreeBSD.org/snapshots/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 11.0-STABLE should subscribe to the <stable@FreeBSD.org> mailing list.

For questions about this documentation, e-mail <doc@FreeBSD.org>.

\ No newline at end of file Index: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html =================================================================== --- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html (revision 49627) +++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html (revision 49628) @@ -1,96 +1,98 @@ -FreeBSD 9.3-RELEASE Errata

FreeBSD 9.3-RELEASE Errata

+FreeBSD 9.3-RELEASE Errata

FreeBSD 9.3-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use of these trademarks by its members.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the ® symbol.

Last modified on 2016-01-14 11:11:46Z by gjb.
Abstract

This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 9.3-RELEASE will be maintained until the EoL of FreeBSD 9.3-STABLE.


1. Introduction

This errata document contains late-breaking news about FreeBSD 9.3-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.

Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the current errata for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 9.3-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).

For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.

2. Security Advisories

Problems described in the following security advisories have been fixed in 9.3-RELEASE. For more information, consult the individual advisories available from http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-14:18.openssl9 September 2014

Multiple vulnerabilities

FreeBSD-SA-14:19.tcp16 September 2014

Denial of Service in TCP packet processing.

FreeBSD-SA-14:20.rtsold21 October 2014

Remote buffer overflow vulnerability.

FreeBSD-SA-14:21.routed21 October 2014

Remote denial of service vulnerability.

FreeBSD-SA-14:22.namei21 October 2014

Memory leak in sandboxed namei lookup.

FreeBSD-SA-14:23.openssl21 October 2014

Multiple vulerabilities.

FreeBSD-SA-14:25.setlogin04 November 2014

Kernel stack disclosure.

FreeBSD-SA-14:26.ftp04 November 2014

Remote code execution.

FreeBSD-SA-14:28.file10 December 2014

Multiple vulnerabilities in file(1) and libmagic(3)

FreeBSD-SA-14:29.bind10 December 2014

Remote denial of service vulnerability

FreeBSD-SA-14:31.ntp23 December 2014

Multiple vulnerabilities

FreeBSD-SA-15:01.openssl14 January 2015

Multiple vulnerabilities

FreeBSD-SA-15:02.kmem27 January 2015

SCTP kernel memory corruption and disclosure vulnerability

FreeBSD-SA-15:03.sctp27 January 2015

SCTP stream reset vulnerability

FreeBSD-SA-15:04.igmp25 February 2015

Integer overflow in IGMP protocol

FreeBSD-SA-15:05.igmp25 February 2015

Remote denial of service vulnerability

FreeBSD-SA-15:06.openssl19 March 2015

Multiple vulnerabilities

FreeBSD-SA-15:07.ntp7 April 2015

Multiple vulnerabilities

FreeBSD-SA-15:09.ipv67 April 2015

Router advertisement Denial of Service

FreeBSD-SA-15:10.openssl16 June 2015

Multiple vulnerabilities

FreeBSD-SA-15:11.bind7 July 2015

Resolver remote denial of service

FreeBSD-SA-15:13.tcp21 July 2015

resource exhaustion due to sessions stuck in LAST_ACK state.

FreeBSD-SA-15:15.tcp28 July 2015

resource exhaustion in TCP reassembly

FreeBSD-SA-15:16.openssh28 July 2015

Multiple vulnerabilities

FreeBSD-SA-15:17.bind28 July 2015

Remote denial of service vulnerability

FreeBSD-SA-15:19.routed5 August 2015

Remote denial of service vulnerability

FreeBSD-SA-15:20.expat18 August 2015

Fix multiple integer overflows in libbsdxml(3).

FreeBSD-SA-15:21.amd6425 August 2015

Fix local privilege escalation in IRET handler.

FreeBSD-SA-15:22.openssh25 August 2015

Multiple vulnerabilities

FreeBSD-SA-15:23.bind2 September 2015

Remote denial of service vulnerability

FreeBSD-SA-15:24.rpcbind29 September 2015

Remote denial of service

FreeBSD-SA-15:25.ntp26 October 2015

Multiple vulnerabilities

FreeBSD-SA-15:26.openssl5 December 2015

Multiple vulnerabilities

FreeBSD-SA-15:27.bind16 December 2015

Remote denial of service

FreeBSD-SA-16:01.sctp14 January 2016

ICMPv6 error message vulnerability

FreeBSD-SA-16:02.ntp14 January 2016

Panic threshold bypass vulnerability

FreeBSD-SA-16:03.linux14 January 2016

Incorrect futex handling

FreeBSD-SA-16:04.linux14 January 2016

setgroups(2) system call vulnerability

FreeBSD-SA-16:05.tcp14 January 2016

MD5 signature denial of service

FreeBSD-SA-16:06.bsnmpd14 January 2016

Insecure default configuration file permissions

FreeBSD-SA-16:07.openssh14 January 2016

OpenSSH client information leak

FreeBSD-SA-16:08.bind27 January 2016

Remote denial of service vulnerability.

FreeBSD-SA-16:09.ntp27 January 2016

Multiple vulnerabilities.

FreeBSD-SA-16:10.linux27 January 2016

issetugid(2) system call vulnerability.

FreeBSD-SA-16:11.openssl30 January 2016

SSLv2 cipher suite downgrade vulnerability.

FreeBSD-SA-16:12.openssl7 March 2016

Multiple vulnerabilities

FreeBSD-SA-16:13.bind10 March 2016

Multiple vulnerabilities

FreeBSD-SA-16:14.openssh-xauth16 March 2016

OpenSSH xauth injection vulnerability

FreeBSD-SA-16:15.sysarch16 March 2016

Incorrect argument validation in sysarch(2)

FreeBSD-SA-16:09.ntp29 April 2016

Multiple ntp vulnerabilities.

FreeBSD-SA-16:17.openssl29 April 2016

Multiple OpenSSL vulnerabilities.

FreeBSD-SA-16:18.atkbd17 May 2016

Keyboard driver buffer overflow

FreeBSD-SA-16:19.sendmsg17 May 2016

Incorrect argument handling in sendmsg(2)

FreeBSD-SA-16:20.linux31 May 2016

Kernel stack disclosure in Linux compatibility layer

FreeBSD-SA-16:21.43bsd31 May 2016

Kernel stack disclosure in 4.3BSD compatibility layer

FreeBSD-SA-16:22.libarchive31 May 2016

Absolute path traversal vulnerability

FreeBSD-SA-16:23.libarchive31 May 2016

Absolute path traversal vulnerability

FreeBSD-SA-16:24.ntp3 June 2016

Multiple ntp vulnerabilties

FreeBSD-SA-16:25.bspatch25 July 2016

heap overflow vulnerability

FreeBSD-SA-16:26.openssl23 September 2016

Multiple vulnerabilities

FreeBSD-SA-16:27.openssl26 September 2016

Regression in OpenSSL suite

FreeBSD-SA-16:28.bind10 October 2016

BIND denial of - service

FreeBSD-SA-16:29.bspatch10 October 2016

Heap overflow vulnerability

FreeBSD-SA-16:30.portsnap10 October 2016

Multiple vulnerabilities

FreeBSD-SA-16:31.libarchive10 October 2016

Multiple vulnerabilities

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-14:10.tzdata21 October 2014

Time zone data file update

FreeBSD-EN-14:11.crypt21 October 2014

Change crypt(3) default hashing algorithm + service

FreeBSD-SA-16:29.bspatch10 October 2016

Heap overflow vulnerability

FreeBSD-SA-16:30.portsnap10 October 2016

Multiple vulnerabilities

FreeBSD-SA-16:31.libarchive10 October 2016

Multiple vulnerabilities

FreeBSD-SA-16:34.bind2 November 2016

Remote Denial of Service + vulnerability

FreeBSD-SA-16:35.openssl2 November 2016

Remote Denial of Service + vulnerability

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-14:10.tzdata21 October 2014

Time zone data file update

FreeBSD-EN-14:11.crypt21 October 2014

Change crypt(3) default hashing algorithm back to DES

FreeBSD-EN-14:12.zfs11 November 2014

Fix NFSv4 and ZFS cache consistency issue

FreeBSD-EN-14:13.freebsd-update23 December 2014

Fixed directory deletion issue in freebsd-update(8)

FreeBSD-EN-15:01.vt25 February 2015

vt(4) crash with improper ioctl parameters

FreeBSD-EN-15:02.openssl25 February 2015

OpenSSL update

FreeBSD-EN-15:03.freebsd-update25 February 2015

freebsd-update(8) updates libraries in suboptimal order

FreeBSD-EN-15:04.freebsd-update13 May 2015

freebsd-update(8) does not ensure the previous upgrade has completed

FreeBSD-EN-15:06.file9 June 2015

Multiple denial of service issues

FreeBSD-EN-15:08.sendmail30 June 2015 (revised)

Sendmail TLS/DH interoperability improvement

FreeBSD-EN-15:09.xlocale30 June 2015

Fix inconsistency between locale and rune locale states

FreeBSD-EN-15:15.pkg25 August 2015

Insufficient check of supported pkg(7) signature methods.

FreeBSD-EN-15:18.pkg16 September 2015

Implement pubkey support for pkg(7) bootstrap.

FreeBSD-EN-15:19.kqueue4 November 2015

kqueue(2) write events never fire for files larger than 2GB.

FreeBSD-EN-15:20.vm4 November 2015

Applications exiting due to segmentation violation on a correct memory address.

FreeBSD-EN-16:02.pf14 January 2016

Invalid TCP checksum issue.

FreeBSD-EN-16:03.yplib14 January 2016

YP/NIS library bug.

FreeBSD-EN-16:08.zfs4 May 2016

Memory leak in ZFS

FreeBSD-EN-16:09.freebsd-update25 July 2016

Fix freebsd-update(8) support of FreeBSD 11.0-RELEASE

4. Late-Breaking News

No late-breaking news.

This file, and other release-related documents, can be downloaded from https://www.FreeBSD.org/releases/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 9.3-STABLE should subscribe to the <stable@FreeBSD.org> mailing list.

For questions about this documentation, e-mail <doc@FreeBSD.org>.

\ No newline at end of file