Copyright © 2000, 2001, 2002, 2003, 2004, 2005 The FreeBSD Documentation Project
$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
1.1.2.136 2007/03/07 20:00:32 bmah Exp $
FreeBSD is a registered trademark of the FreeBSD Foundation.
Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the ``™'' or the ``®'' symbol.
This document lists errata items for FreeBSD 4.11-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.
This errata document contains ``late-breaking news'' about FreeBSD 4.11-RELEASE. Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.
Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the ``current errata'' for this release. These other copies of the errata are located at http://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.
Source and binary snapshots of FreeBSD 4-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).
For a list of all FreeBSD CERT security advisories, see http://security.FreeBSD.org/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.
Note: FreeBSD 4.11-RELEASE, as well as the FreeBSD 4-STABLE branch from which it comes, have reached ``End of Life'' status and are no longer supported as of 1 February 2007. Specifically, the Security Officer Team will no longer be issuing advisories against FreeBSD 4-STABLE. In addition, the Ports Manager Team will no longer perform package builds for 4-STABLE, and building ports from source on 4-STABLE is no longer supported.
Additional information on this topic can be found in a posting to the FreeBSD-STABLE mailing list.
The following security advisories pertain to FreeBSD 4.11-RELEASE. For more information, consult the individual advisories available from http://security.FreeBSD.org/advisories/.
Advisory | Date | Topic |
---|---|---|
SA-05:01.telnet | 28 March 2005 |
telnet client buffer overflows |
SA-05:02.sendfile | 4 April 2005 |
sendfile kernel memory disclosure |
SA-05:04.ifconf | 15 April 2005 |
Kernel memory disclosure in ifconf() |
SA-05:05.cvs | 22 April 2005 |
Multiple vulnerabilities in CVS |
SA-05:06.iir | 6 May 2005 |
Incorrect permissions on /dev/iir |
SA-05:07.ldt | 6 May 2005 |
Local kernel memory disclosure in i386_get_ldt |
SA-05:08.kmem | 6 May 2005 |
Local kernel memory disclosure |
SA-05:09.htt | 13 May 2005 |
information disclosure when using HTT |
SA-05:11.gzip | 9 June 2005 |
gzip directory traversal and permission race vulnerabilities |
SA-05:14.bzip2 | 29 June 2005 |
bzip2 denial of service and permission race vulnerabilities |
SA-05:15.tcp | 29 June 2005 |
TCP connection stall denial of service |
SA-06:16.smbfs | 31 May 2006 |
smbfs chroot escape |
SA-06:17.sendmail | 14 June 2006 |
Incorrect multipart message handling in Sendmail |
SA-06:18.ppp | 23 August 2006 |
Buffer overflow in sppp(4) |
SA-06:19.openssl | 06 September 2006 |
Incorrect PKCS#1 v1.5 padding validation in crypto(3) |
SA-06:21.gzip | 19 September 2006 |
Multiple vulnerabilities in gzip(1) |
SA-06:22.openssh | 30 September 2006 |
Multiple vulnerabilities in OpenSSH |
SA-06:23.openssl | 28 September 2006 |
Multiple problems in crypto(3) |
SA-06:25.kmem | 6 December 2006 |
Kernel memory disclosure in firewire(4) |
SA-06:26.gtar | 6 December 2006 |
gtar(1) name mangling symlink vulnerability |
This file, and other release-related documents, can be downloaded from http://snapshots.jp.FreeBSD.org/.
For questions about FreeBSD, read the documentation before contacting <[email protected]>.
All users of FreeBSD 4-STABLE should subscribe to the <[email protected]> mailing list.
For questions about this documentation, e-mail <[email protected]>.