Copyright © 2014 The FreeBSD Documentation Project
FreeBSD is a registered trademark of the FreeBSD Foundation.
Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use of these trademarks by its members.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the “™” or the “®” symbol.
This document lists errata items for FreeBSD 9.2-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.
This errata document for FreeBSD 9.2-RELEASE will be maintained until the release of FreeBSD 9.3-RELEASE.
This errata document contains “late-breaking news” about FreeBSD 9.2-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.
Any version of this errata document actually distributed
with the release (for example, on a CDROM distribution) will be
out of date by definition, but other copies are kept updated on
the Internet and should be consulted as the “current
errata” for this release. These other copies of the
errata are located at http://www.FreeBSD.org/releases/
, plus any sites
which keep up-to-date mirrors of this location.
Source and binary snapshots of FreeBSD 9.3-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).
For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/
or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/
.
Problems described in the following security advisories have
been fixed in 9.3-RELEASE. For more information, consult
the individual advisories available from
http://security.FreeBSD.org/
.
Advisory | Date | Topic |
---|---|---|
SA-14:01.bsnmpd | 1 January 2014 | Fix bsnmpd remote denial of service vulnerability |
SA-14:02.ntpd | 1 January 2014 | Fix ntpd distributed reflection Denial of Service vulnerability |
SA-14:03.ntpd | 1 January 2014 | Fix BIND remote denial of service vulnerability |
SA-14:05.nfsserver | 8 April 2014 | Fix NFS deadlock vulnerability |
SA-14:06.openssl | 8 April 2014 | Fix ECDSA Cache Side-channel Attack |
SA-14:08.tcp | 30 April 2014 | Fix TCP reassembly vulnerability |
SA-14:11.sendmail | 3 June 2014 | Fix sendmail improper close-on-exec flag handling |
SA-14:12.ktrace | 3 June 2014 | Fix ktrace memory disclosure |
SA-14:13.pam | 3 June 2014 | Fix incorrect error handling in PAM policy parser |
SA-14:14.openssl | 5 June 2014 | Multiple vulnerabilities |
SA-14:16.file | 24 June 2014 | Multiple vulnerabilities |
SA-14:17.kmem | 8 July 2014 | Kernel memory disclosure in control messages and SCTP notifications |
This file, and other release-related documents, can be downloaded from http://www.FreeBSD.org/releases/.
For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.
All users of FreeBSD 9.3-STABLE should subscribe to the <current@FreeBSD.org> mailing list.
For questions about this documentation, e-mail <doc@FreeBSD.org>.