aboutsummaryrefslogtreecommitdiff
path: root/website/content/en/releases/13.2R/errata.adoc
blob: 00e3680bb230781142311c6b570e1aec50b5ae44 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
---
title: "FreeBSD 13.2-RELEASE Errata"
sidenav: download
---

:release: 13.2-RELEASE
:releaseNext: 13.3-RELEASE
:releaseBranch: 13-STABLE

= FreeBSD {release} Errata

== Abstract

This document lists errata items for FreeBSD {release}, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation.
This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability.
An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD {release} will be maintained until the release of FreeBSD {releaseNext}.

== Table of Contents

* <<intro,Introduction>>
* <<security,Security Advisories>>
* <<errata,Errata Notices>>
* <<open-issues,Open Issues>>
* <<late-news,Late-Breaking News>>
* <<erratas-announcement,Erratas in Announcement>>

[[intro]]
== Introduction

This errata document contains "late-breaking news" about FreeBSD {release}.
Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.

Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release.
These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD {releaseBranch} also contain up-to-date copies of this document (as of the time of the snapshot).

For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.

[[security]]
== Security Advisories

[width="100%",cols="40%,30%,30%",options="header",]
|===
|Advisory |Date |Topic
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:04.pam_krb5.asc[FreeBSD-SA-23:04.pam_krb5] |21 June 2023 |Network authentication attack via pam_krb5
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:06.ipv6.asc[FreeBSD-SA-23:06.ipv6] |1 August 2023 |Remote denial of service in IPv6 fragment reassembly
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:07.bhyve.asc[FreeBSD-SA-23:07.bhyve] |1 August 2023 |bhyve privileged guest escape via fwctl
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:08.ssh.asc[FreeBSD-SA-23:08.ssh] |1 August 2023 |Potential remote code execution via ssh-agent forwarding
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:09.pam_krb5.asc[FreeBSD-SA-23:09.pam_krb5] |1 August 2023 |Network authentication attack via pam_krb5
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:10.pf.asc[FreeBSD-SA-23:10.pf] |6 September 2023 |pf incorrectly handles multiple IPv6 fragment headers
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:11.wifi.asc[FreeBSD-SA-23:11.wifi] |6 September 2023 |Wi-Fi encryption bypass
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:12.msdosfs.asc[FreeBSD-SA-23:12.msdosfs] |3 October 2023 |msdosfs data disclosure
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:13.capsicum.asc[FreeBSD-SA-23:13.capsicum] |3 October 2023 |copy_file_range insufficient capability rights check
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:14.smccc.asc[FreeBSD-SA-23:14.smccc] |3 October 2023 |arm64 boot CPUs may lack speculative execution protections
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:15.stdio.asc[FreeBSD-SA-23:15.stdio] |8 November 2023 |libc stdio buffer overflow
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:16.cap_net.asc[FreeBSD-SA-23:16.cap_net] |8 November 2023 |Incorrect libcap_net limitation list manipulation
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:17.pf.asc[FreeBSD-SA-23:17.pf] |5 December 2023 |TCP spoofing vulnerability in pf(4)
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:18.nfsclient.asc[FreeBSD-SA-23:18.nfsclient] |12 December 2023 |NFS client data corruption and kernel memory disclosure
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-23:19.openssh.asc[FreeBSD-SA-23:19.openssh] |19 December 2023 |Prefix Truncation Attack in the SSH protocol
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-24:01.bhyveload.asc[FreeBSD-SA-24:01.bhyveload] |14 February 2024 |bhyveload(8) host file access
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-24:02.tty.asc[FreeBSD-SA-24:02.tty] |14 February 2024 |jail(2) information leak
|===

[[errata]]
== Errata Notices

[width="100%",cols="40%,30%,30%",options="header",]
|===
|Errata |Date |Topic
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:06.loader.asc[FreeBSD-EN-23:06.loader] |21 June 2023 |x86 kernel console configuration
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:07.mpr.asc[FreeBSD-EN-23:07.mpr] |21 June 2023 |mpr(4) may fail to initialize devices
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:08.vnet.asc[FreeBSD-EN-23:08.vnet] |1 August 2023 |VNET and DPCPU module panic on arm64
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:09.freebsd-update.asc[FreeBSD-EN-23:09.freebsd-update] |6 September 2023 |freebsd-update incorrectly merges files on upgrade
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:10.pci.asc[FreeBSD-EN-23:10.pci] |6 September 2023 |PCI-e hot-plug is broken with certain devices
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:11.caroot.asc[FreeBSD-EN-23:11.caroot] |6 September 2023 |Root certificate bundle update
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:12.freebsd-update.asc[FreeBSD-EN-23:12.freebsd-update] |3 October 2023 |freebsd-update to 14.0 fails
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:13.freebsd-update.asc[FreeBSD-EN-23:13.freebsd-update] |8 November 2023 |freebsd-update does not handle deep boot environments
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:14.regcomp.asc[FreeBSD-EN-23:14.regcomp] |8 November 2023 |Incorrect regular expression escape handling
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-23:16.openzfs.asc[FreeBSD-EN-23:16.openzfs] |1 December 2023 |OpenZFS data corruption
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-24:01.tzdata.asc[FreeBSD-EN-23:01.tzdata] |14 February 2024 |Timezone database information update
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-24:02.libutil.asc[FreeBSD-EN-23:02.libutil] |14 February 2024 |Login class resource limits and CPU mask bypass
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-EN-24:03.kqueue.asc[FreeBSD-EN-23:03.kqueue] |14 February 2024 |kqueue_close(2) page fault on exit using rfork(2)
|===

[[open-issues]]
== Open Issues

No open issues.

[[late-news]]
== Late-Breaking News

No late-breaking news.

[[erratas-announcement]]
== Erratas in Announcement

* tzdata version is 2023c and not 2023b.
* OpenSSH version is 9.3p1 and not 9.2p1.