%man; %authors; %mlists; %trademarks; %release; ]>
&os; <![ %release.type.snapshot [ &release.prev; ]]> <![ %release.type.release [ &release.current; ]]> Errata The &os; Project $FreeBSD: head/release/doc/en_US.ISO8859-1/errata/article.sgml 120801 2003-10-05 09:17:25Z hrs $ 2000 2001 2002 2003 The FreeBSD Documentation Project &tm-attrib.freebsd; &tm-attrib.intel; &tm-attrib.sparc; &tm-attrib.general; This document lists errata items for &os; containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of &os;. This errata document for &os; will be maintained until the release of &os; &release.next;. Introduction This errata document contains late-breaking news about &os; Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the current errata for this release. These other copies of the errata are located at , plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of &os; &release.branch; also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all &os; CERT security advisories, see or . Security Advisories No advisories. ]]> The implementation of the &man.realpath.3; function contained a single-byte buffer overflow bug. This had various impacts, depending on the application using &man.realpath.3; and other factors. This bug was fixed on the &release.branch; development branch before &release.prev;; &os; &release.prev; is therefore not affected. However, this change was not noted in the release documentation. For more information, see security advisory FreeBSD-SA-03:08. The kernel contains a bug that could allow it to attempt delivery of invalid signals, leading to a kernel panic or, under some circumstances, unauthorized modification of kernel memory. This bug has been fixed on the &release.branch; development branch and the &release.prev; security fix branch. For more information, see security advisory FreeBSD-SA-03:09. A bug in the iBCS2 emulation module could result in disclosing the contents of kernel memory. (Note that this module is not enabled in &os; by default.) This bug has been fixed on the &release.branch; development branch and the &release.prev; security fix branch. More information can be found in security advisory FreeBSD-SA-03:10. OpenSSH contains a bug in its buffer management code that could potentially cause it to crash. This bug has been fixed via a vendor-supplied patch on the &release.branch; development branch and the &release.prev; security fix branch. For more details, refer to security advisory FreeBSD-SA-03:12. sendmail contains a remotely-exploitable buffer overflow. This bug has been fixed via a new version import on the &release.branch; development branch and via a vendor-supplied patch on the &release.prev; security fix branch. More details can be found in security advisory FreeBSD-SA-03:13. The &os; ARP code contains a bug that could allow the kernel to cause resource starvation which eventually results in a system panic. This bug has been fixed on the &release.branch; development branch and the &release.prev; security fix branch. More information can be found in security advisory FreeBSD-SA-03:14. The implementation of the &man.procfs.5; and the &man.linprocfs.5; contain a bug that could result in disclosing the contents of kernel memory. This bug has been fixed on the &release.branch; development branch and the &release.prev; security fix branch. More information can be found in security advisory FreeBSD-SA-03:17. OpenSSL contains several bugs which could allow a remote attacker to crash an OpenSSL-using application or to execute arbitrary code with the privileges of the application. These bugs have been fixed via a vendor-supplied patch on the &release.branch; development branch and the &release.prev; security fix branch. Note that only applications that use OpenSSL's ASN.1 or X.509 handling code are affected (OpenSSH is unaffected, for example). More information can be found in security advisory FreeBSD-SA-03:18. ]]> Open Issues No open issues. ]]> The RAIDframe disk driver described in &man.raid.4; is non-functional for this release. ACPI seems to make some &i386; machines unstable. Turning off ACPI support may help solve some of these problems; see an item in . An integer overflow could cause kernel panics on PAE-using machines with certain memory sizes. This bug has been corrected on both the RELENG_5_1 and HEAD branches. A workaround for this problem is to remove some memory, update the system in question, and reinstall the memory. Attempting to write to an &man.msdosfs.5; file system that has been upgraded from read-only to read-write via mount -u will cause the system to lock up. To work around this problem, unmount the file system first, then mount it again with the appropriate options instead of using mount -u. ]]> Late-Breaking News No news. ]]> &man.ipfw.4; should work correctly on strict-alignment 64-bit architectures such as alpha and &sparc64;. The release notes should have stated that the libthr library is built by default for the &i386; platform. &os; &release.prev; includes some new boot loader scripts designed to make booting &os; with different options easier. This may help diagnose bootstrapping problems. These scripts build on the existing Forth-based boot loader scripts (thus, /boot/loader.conf and other existing loader configuration files still apply). They are only installed by default for new binary installs on &i386; machines. The new scripts present a boot-time menu that controls how &os; is booted, and include options to turn off ACPI, a safe mode boot, single-user booting, and verbose booting. Safe mode booting can be particularly useful when compatibility with a system's hardware is uncertain, and sets the following kernel tunable variables: hint.acpi.0.disabled=1 # disable ACPI (i386 only) hw.ata.ata_dma=0 # disable IDE DMA hw.ata.atapi_dma=0 # disable ATAPI/IDE DMA hw.ata.wc=0 # disable IDE disk write cache hw.eisa_slots=0 # disable probing for EISA devices For new installs on &i386; architecture machines, &man.sysinstall.8; will try to determine if ACPI was disabled via the new boot loader scripts mentioned above, and if so, ask if this change should be made permanent. The release notes should have mentioned that work on the following features was sponsored by the Defense Advanced Research Projects Agency (DARPA): OpenPAM, NSS support, PAE support, various MAC framework updates, the GEOM disk geometry system. ]]>