Index: stable/4/release/doc/en_US.ISO8859-1/errata/article.sgml =================================================================== --- stable/4/release/doc/en_US.ISO8859-1/errata/article.sgml (revision 83005) +++ stable/4/release/doc/en_US.ISO8859-1/errata/article.sgml (revision 83006) @@ -1,175 +1,172 @@ %man; %authors; %mlists; %release; ]>
&os; &release.prev; Errata The &os; Project $FreeBSD$ 2000 2001 The FreeBSD Documentation Project This document lists errata items for &os; &release.prev;, containing significant information discovered after the release. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of &os;. This errata document for &os; &release.prev; will be maintained until the release of &os; &release.next;. ]]> This is the final version of the errata document for &os; &release.prev;. Future errata documents along the &release.branch; branch will address &os; &release.current; and later releases. ]]> Introduction This errata document contains late-breaking news about &os; &release.prev;. Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the current errata for this release. These other copies of the errata are located at , plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of &os; &release.branch; also contain up-to-date copies of this document (as of the time of the snapshot). - Any changes to this file will also be emailed to the - &a.stable;. - For a list of all &os; CERT security advisories, see or . Security Advisories The vulnerability documented in security advisory FreeBSD-SA-01:39 was fixed in &os; &release.prev;. The release notes mentioned the fix, but made no mention of the security advisory. A vulnerability in the &man.fts.3; routines (used by applications for recursively traversing a filesystem) could allow a program to operate on files outside the intended directory hierarchy. This bug, as well as a fix, is described in security advisory FreeBSD-SA-01:40. A flaw allowed some signal handlers to remain in effect in a child process after being exec-ed from its parent. This allowed an attacker to execute arbitrary code in the context of a setuid binary. More details, as well as a fix, are described in security advisory FreeBSD-SA-01:42. A remote buffer overflow in &man.tcpdump.1; could be triggered by sending certain packets at a target machine. More details, as well as a fix, can be found in security advisory FreeBSD-SA-01:48. A remote buffer overflow in &man.telnetd.8; could result in arbitrary code running on a target machine. More details, as well as a fix, can be found in security advisory FreeBSD-SA-01:49. A vulnerability whereby a remote attacker could exhaust a target's pool of network buffers has been closed. More details, as well as a fix, can be found in security advisory FreeBSD-SA-01:52. A flaw existed in &man.ipfw.8;, in which me filter rules would match the remote IP address of a point-to-point interface in addition to the intended local IP address. More details, as well as a fix, can be found in security advisory FreeBSD-SA-01:53. A vulnerability in &man.procfs.5; could allow a process to read sensitive information from another process's memory space. For more details, as well as information on patches, see security advisory FreeBSD-SA-01:55. PARANOID hostname checking in tcp_wrappers did not work correctly. For more details and information on patches, see security advisory FreeBSD-SA-01:56. &man.sendmail.8; has a local root vulnerability. For more details and patch information, see security advisory FreeBSD-SA-01:57. &man.lpd.8; contained a remotely-exploitable buffer overflow. For more details, and a fix for this problem, see security advisory FreeBSD-SA-01:58. System Update Information The release note entry for the ESS Maestro-3/Allegro sound driver gave an incorrect command for loading the driver via /boot/loader.conf. The correct command is: snd_maestro3_load="YES" &man.ssh.1; is no longer SUID root. The primary manifestation of this change is that .shosts authentication may not work out of the box. Both temporary and permanent fixes are described in an item in the FAQ.