Index: stable/4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml =================================================================== --- stable/4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml (revision 145779) +++ stable/4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml (revision 145780) @@ -1,285 +1,298 @@ &os;/&arch; &release.current; Release Notes $FreeBSD$ The &os; Project 2000 2001 2002 2003 2004 2005 The &os; Documentation Project The release notes for &os; &release.current; contain a summary of the changes made to the &os; base system since &release.prev;. Both changes for kernel and userland are listed, as well as applicable security advisories for the base system that were issued since the last release. Some brief remarks on upgrading are also presented. Introduction This document contains the release notes for &os; &release.current; on the &arch.print; hardware platform. It describes new features of &os; that have been added (or changed) since &release.prev;. It also provides some notes on upgrading from previous versions of &os;. The &release.type; distribution to which these release notes apply represents a point along the &release.branch; development branch between &release.prev; and the future &release.next;. Some pre-built, binary &release.type; distributions along this branch can be found at . ]]> This distribution of &os; &release.current; is a &release.type; distribution. It can be found at or any of its mirrors. More information on obtaining this (or other) &release.type; distributions of &os; can be found in the Obtaining FreeBSD appendix in the FreeBSD Handbook. ]]> What's New This section describes the most user-visible new or changed features in &os; since &release.prev;. Typical release note items document new drivers or hardware support, new commands or options, major bugfixes, or contributed software upgrades. Security advisories for the base system that were issued after &release.prev; are also listed. Security Advisories Two buffer overflows in the TELNET client program have been corrected. They could have allowed a malicious TELNET server or an active network attacker to cause &man.telnet.1; to execute arbitrary code with the privileges of the user running it. More information can be found in security advisory FreeBSD-SA-05:01.telnet. A information disclosure vulnerability in the &man.sendfile.2; system call, which could permit it to transmit random parts of kernel memory, has been fixed. More details are in security advisory FreeBSD-SA-05:02.sendfile. + + An information leak vulnerability in the + SIOCGIFCONF &man.ioctl.2;, which leaked 12 + bytes of kernel memory, has been fixed. More details are in security advisory + FreeBSD-SA-05:04.ifconf. + + + Several programming errors in &man.cvs.1;, which could + potentially cause arbitrary code to be executed on CVS servers, + have been corrected. Further information can be found in + security advisory + FreeBSD-SA-05:05.cvs. + Kernel Changes Platform-Specific Hardware Support Boot Loader Changes Network Interface Support Network Protocols Disks and Storage File Systems PCCARD Support Multimedia Support Userland Changes The &man.getaddrinfo.3; function now queries A DNS resource records before AAAA records when AF_UNSPEC is specified. Some broken DNS servers return NXDOMAIN against non-existent AAAA queries, even when it should return NOERROR with empty return records. This is a problem for an IPv4/IPv6 dual stack node because the NXDOMAIN returned by the first query of an AAAA record makes the querying server stop attempting to resolve the A record if any. Also, this behavior has been recognized as a potential denial-of-service attack (see for more details). Note that although the query order has been changed, the returned result still includes AF_INET6 records before AF_INET records. Contributed Software sendmail has been updated from version 8.13.1 to version 8.13.3. Ports/Packages Collection Infrastructure Release Engineering and Integration Upgrading from previous releases of &os; If you're upgrading from a previous release of &os;, you generally will have three options: Using the binary upgrade option of &man.sysinstall.8;. This option is perhaps the quickest, although it presumes that your installation of &os; uses no special compilation options. Performing a complete reinstall of &os;. Technically, this is not an upgrading method, and in any case is usually less convenient than a binary upgrade, in that it requires you to manually backup and restore the contents of /etc. However, it may be useful in cases where you want (or need) to change the partitioning of your disks. From source code in /usr/src. This route is more flexible, but requires more disk space, time, and technical expertise. More information can be found in the Using make world section of the FreeBSD Handbook. Upgrading from very old versions of &os; may be problematic; in cases like this, it is usually more effective to perform a binary upgrade or a complete reinstall. Please read the INSTALL.TXT file for more information, preferably before beginning an upgrade. If you are upgrading from source, please be sure to read /usr/src/UPDATING as well. Finally, if you want to use one of various means to track the -STABLE or -CURRENT branches of &os;, please be sure to consult the -CURRENT vs. -STABLE section of the FreeBSD Handbook. Upgrading &os; should, of course, only be attempted after backing up all data and configuration files.