FreeBSD 5.4-RELEASE Errata

The FreeBSD Project

$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.69.2.32 2006/02/05 20:45:04 bmah Exp $

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

Sparc, Sparc64, SPARCEngine, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. Products bearing SPARC trademarks are based upon architecture developed by Sun Microsystems, Inc.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the ``™'' or the ``®'' symbol.


This document lists errata items for FreeBSD 5.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 5.4-RELEASE will be maintained until the release of FreeBSD 5.5-RELEASE.


1 Introduction

This errata document contains ``late-breaking news'' about FreeBSD 5.4-RELEASE. Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.

Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the ``current errata'' for this release. These other copies of the errata are located at http://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 5-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.


2 Security Advisories

The following security advisories pertain to FreeBSD 5.4-RELEASE. For more information, consult the individual advisories available from ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/.

Advisory Date Topic
06:07.pf 25 January 2006

IP fragment handling panic in pf(4)

06:03.cpio 11 January 2006

Multiple vulnerabilities in cpio(1)

06:02.eex 11 January 2006

ee(1) temporary file privilege escalation

06:01.texindex 11 January 2006

Texindex temporary file privilege escalation

SA-05:09.htt 22 May 2005

information disclosure when using HTT

SA-05:10.tcpdump 9 Jun 2005

Infinite loops in tcpdump protocol decoding

SA-05:11.gzip 9 Jun 2005

gzip directory traversal and permission race vulnerabilities

SA-05:13.ipfw 29 Jun 2005

ipfw packet matching errors with address tables

SA-05:14.bzip2 29 Jun 2005

bzip2 denial of service and permission race vulnerabilities

SA-05:15.tcp 29 Jun 2005

TCP connection stall denial of service

SA-05:16.zlib 6 Jul 2005

Buffer overflow in zlib

SA-05:17.devfs 20 Jul 2005

devfs ruleset bypass

SA-05:18.zlib 27 Jul 2005

Buffer overflow in zlib

SA-05:19.ipsec 27 Jul 2005

IPsec incorrect key usage in AES-XCBC-MAC


3 Open Issues

No issues.


4 Late-Breaking News

(6 May 2005) An error in the default permissions on the /dev/iir device node, which allowed unprivileged local users to send commands to the hardware supported by the iir(4) driver. Although the error was fixed prior to 5.4-RELEASE, it was applied too late in the release cycle to be mentioned in the release notes. For more information, see security advisory FreeBSD-SA-05:06.iir.

(6 May 2005) A bug in the validation of i386_get_ldt(2) system call input arguments, which may allow kernel memory may be disclosed to the user process, has been fixed. This bug was fixed prior to 5.4-RELEASE, although not in time to be mentioned in the release notes. For more information, see security advisory FreeBSD-SA-05:07.ldt.

(6 May 2005) Several information disclosure vulnerabilities in various parts of the kernel have been fixed in 5.4-RELEASE, although too late to be mentioned in the release notes. For more information, see security advisory FreeBSD-SA-05:08.kmem.

(24 Jun 2005) The FreeBSD/sparc64 5.4-RELEASE should have stated that the FreeBSD/sparc64 GENERIC kernel prior to the upcoming 6.0-RELEASE officially only supports serial consoles. This is especially true for the FreeBSD/sparc64 5.4-RELEASE GENERIC kernel because the ofw_console(4) driver which also provides limited indirect support for graphical consoles has been replaced with the uart(4) driver in favor better serial support.

Due to this limitation to serial consoles the screen will stop working after the message ``jumping to kernel entry at...'' is displayed when trying to use the FreeBSD/sparc64 5.4-RELEASE GENERIC kernel with a graphical console, while FreeBSD itself continues working actually.

If you want to use FreeBSD/sparc64 with a graphical console anyway you can do one of the following:

For more details of how to recompile your kernel or update to FreeBSD 6.0, see Configuring the FreeBSD Kernel and The Cutting Edge sections in the FreeBSD Handbook, respectively.


This file, and other release-related documents, can be downloaded from http://www.FreeBSD.org/snapshots/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 5-STABLE should subscribe to the <stable@FreeBSD.org> mailing list.

For questions about this documentation, e-mail <doc@FreeBSD.org>.