Index: stable/4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
===================================================================
--- stable/4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml (revision 145779)
+++ stable/4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml (revision 145780)
@@ -1,285 +1,298 @@
&os;/&arch; &release.current; Release Notes
$FreeBSD$
The &os; Project
2000
2001
2002
2003
2004
2005
The &os; Documentation Project
The release notes for &os; &release.current; contain a
summary of the changes made to the &os; base system since
&release.prev;. Both changes for kernel and userland are
listed, as well as applicable security advisories for the base
system that were issued since the last release. Some brief
remarks on upgrading are also presented.
Introduction
This document contains the release notes for &os;
&release.current; on the &arch.print; hardware platform. It
describes new features of &os; that have been added (or changed)
since &release.prev;. It also provides some notes on upgrading
from previous versions of &os;.
The &release.type; distribution to which these release notes
apply represents a point along the &release.branch; development
branch between &release.prev; and the future &release.next;. Some
pre-built, binary &release.type; distributions along this branch
can be found at .
]]>
This distribution of &os; &release.current; is a
&release.type; distribution. It can be found at or any of its mirrors. More
information on obtaining this (or other) &release.type;
distributions of &os; can be found in the Obtaining
FreeBSD
appendix in the FreeBSD
Handbook.
]]>
What's New
This section describes the most user-visible new or changed
features in &os; since &release.prev;. Typical release note items
document new drivers or hardware support, new commands or options,
major bugfixes, or contributed software upgrades. Security
advisories for the base system that were issued after
&release.prev; are also listed.
Security Advisories
Two buffer overflows in the TELNET client program have been
corrected. They could have allowed a malicious TELNET server or
an active network attacker to cause &man.telnet.1; to execute
arbitrary code with the privileges of the user running it.
More information can be found in security advisory
FreeBSD-SA-05:01.telnet.
A information disclosure vulnerability in the
&man.sendfile.2; system call, which could permit it to transmit
random parts of kernel memory, has been fixed. More details are
in security advisory
FreeBSD-SA-05:02.sendfile.
+
+ An information leak vulnerability in the
+ SIOCGIFCONF &man.ioctl.2;, which leaked 12
+ bytes of kernel memory, has been fixed. More details are in security advisory
+ FreeBSD-SA-05:04.ifconf.
+
+
+ Several programming errors in &man.cvs.1;, which could
+ potentially cause arbitrary code to be executed on CVS servers,
+ have been corrected. Further information can be found in
+ security advisory
+ FreeBSD-SA-05:05.cvs.
+
Kernel Changes
Platform-Specific Hardware Support
Boot Loader Changes
Network Interface Support
Network Protocols
Disks and Storage
File Systems
PCCARD Support
Multimedia Support
Userland Changes
The &man.getaddrinfo.3; function now queries A
DNS resource records before AAAA records
when AF_UNSPEC is specified.
Some broken DNS servers return NXDOMAIN
against non-existent AAAA queries,
even when it should return NOERROR
with empty return records. This is a problem for an IPv4/IPv6 dual
stack node because the NXDOMAIN returned
by the first query of an AAAA record makes
the querying server stop attempting to resolve the A
record if any. Also, this behavior has been recognized as a potential
denial-of-service attack (see
for more details).
Note that although the query order has been changed,
the returned result still includes
AF_INET6 records before
AF_INET records.
Contributed Software
sendmail has been updated from
version 8.13.1 to version 8.13.3.
Ports/Packages Collection Infrastructure
Release Engineering and Integration
Upgrading from previous releases of &os;
If you're upgrading from a previous release of &os;, you
generally will have three options:
Using the binary upgrade option of &man.sysinstall.8;.
This option is perhaps the quickest, although it presumes
that your installation of &os; uses no special compilation
options.
Performing a complete reinstall of &os;. Technically,
this is not an upgrading method, and in any case is usually less
convenient than a binary upgrade, in that it requires you to
manually backup and restore the contents of
/etc. However, it may be useful in
cases where you want (or need) to change the partitioning of
your disks.
From source code in /usr/src. This
route is more flexible, but requires more disk space, time,
and technical expertise. More information can be found
in the Using
make world
section of the FreeBSD
Handbook. Upgrading from very old
versions of &os; may be problematic; in cases like this, it
is usually more effective to perform a binary upgrade or a
complete reinstall.
Please read the INSTALL.TXT file for more
information, preferably before beginning an
upgrade. If you are upgrading from source, please be sure to read
/usr/src/UPDATING as well.
Finally, if you want to use one of various means to track the
-STABLE or -CURRENT branches of &os;, please be sure to consult
the -CURRENT
vs. -STABLE
section of the FreeBSD
Handbook.
Upgrading &os; should, of course, only be attempted after
backing up all data and configuration
files.