From 2df9f3516a51fbd92602bfa27fe8ecabba795aa2 Mon Sep 17 00:00:00 2001 From: "Bruce A. Mah" Date: Fri, 12 May 2006 18:48:47 +0000 Subject: Trim errata document for 5.5-RELEASE. Also update version number entities in this file (wait, why aren't we using what was in share/sgml/release.ent?). Because this is the last planned release from the RELENG_5 codeline, remove text that implies that further 5.X releases will be forthcoming. Approved by: re (kensmith) --- release/doc/en_US.ISO8859-1/errata/article.sgml | 287 +----------------------- 1 file changed, 4 insertions(+), 283 deletions(-) diff --git a/release/doc/en_US.ISO8859-1/errata/article.sgml b/release/doc/en_US.ISO8859-1/errata/article.sgml index 964d3f0539a3..dc65469d4d8a 100644 --- a/release/doc/en_US.ISO8859-1/errata/article.sgml +++ b/release/doc/en_US.ISO8859-1/errata/article.sgml @@ -16,8 +16,7 @@ %release; - - + ]>
@@ -59,9 +58,6 @@ operation or usability. An up-to-date version of this document should always be consulted before installing this version of &os;. - - This errata document for &os; &release.bugfix; - will be maintained until the release of &os; &release.bugfix.next;. @@ -95,166 +91,7 @@ Security Advisories - The following security advisories pertain to &os; &release.bugfix;. - For more information, consult the individual advisories available from - . - - - - - - - - - Advisory - Date - Topic - - - - - - 06:14.fpu - 19 April 2006 - FPU information disclosure - - - - 06:13.sendmail - 22 March 2006 - Race condition in sendmail - - - - 06:12.opie - 22 March 2006 - OPIE arbitrary password change - - - - 06:11.ipsec - 22 March 2006 - IPsec replay attack vulnerability - - - - 06:10.nfs - 1 March 2006 - Remote denial of service in NFS server - - - - 06:09.openssh - 1 March 2006 - Remote denial of service in OpenSSH - - - - 06:07.pf - 25 January 2006 - IP fragment handling panic in &man.pf.4; - - - - 06:03.cpio - 11 January 2006 - Multiple vulnerabilities in &man.cpio.1; - - - - 06:02.eex - 11 January 2006 - &man.ee.1; temporary file privilege escalation - - - - 06:01.texindex - 11 January 2006 - Texindex temporary file privilege escalation - - - - SA-05:09.htt - 22 May 2005 - information disclosure when using HTT - - - - SA-05:10.tcpdump - 9 Jun 2005 - Infinite loops in tcpdump protocol decoding - - - - SA-05:11.gzip - 9 Jun 2005 - gzip directory traversal and permission race vulnerabilities - - - - SA-05:13.ipfw - 29 Jun 2005 - ipfw packet matching errors with address tables - - - - SA-05:14.bzip2 - 29 Jun 2005 - bzip2 denial of service and permission race vulnerabilities - - - - SA-05:15.tcp - 29 Jun 2005 - TCP connection stall denial of service - - - - SA-05:16.zlib - 6 Jul 2005 - Buffer overflow in zlib - - - - SA-05:17.devfs - 20 Jul 2005 - devfs ruleset bypass - - - - SA-05:18.zlib - 27 Jul 2005 - Buffer overflow in zlib - - - - SA-05:19.ipsec - 27 Jul 2005 - IPsec incorrect key usage in AES-XCBC-MAC - - - - + No advisories. @@ -266,122 +103,6 @@ Late-Breaking News - (6 May 2005) An error in the default permissions on the - /dev/iir device node, - which allowed unprivileged local users to send commands to the - hardware supported by the &man.iir.4; driver. Although the - error was fixed prior to &release.prev;, it was applied too late - in the release cycle to be mentioned in the release notes. For - more information, see security advisory - FreeBSD-SA-05:06.iir. - - - (6 May 2005) A bug in the validation of &man.i386.get.ldt.2; - system call input arguments, which may allow kernel memory may - be disclosed to the user process, has been fixed. This bug was - fixed prior to &release.prev;, although not in time to be - mentioned in the release notes. For more information, see - security advisory - FreeBSD-SA-05:07.ldt. - - - (6 May 2005) Several information disclosure vulnerabilities - in various parts of the kernel have been fixed in - &release.prev;, although too late to be mentioned in the release - notes. For more information, see security advisory - FreeBSD-SA-05:08.kmem. - - - (24 Jun 2005) The &os;/sparc64 &release.bugfix; should - have stated that the &os;/sparc64 GENERIC kernel prior - to the upcoming 6.0-RELEASE officially only supports serial consoles. - This is especially true for the &os;/sparc64 &release.bugfix; - GENERIC kernel because the ofw_console(4) driver which also provides - limited indirect support for graphical consoles has been replaced - with the &man.uart.4; driver in favor better serial support. - - Due to this limitation to serial consoles the screen will - stop working after the message jumping to kernel entry - at... is - displayed when trying to use the &os;/sparc64 &release.bugfix; - GENERIC kernel with a graphical console, while &os; itself continues - working actually. - - If you want to use &os;/sparc64 with a graphical console anyway - you can do one of the following: - - - - In case your machine is equipped with a Sun Creator, - Sun Creator3D, or Sun Elite3D frame buffer card - and a Sun RS232 keyboard you can install &os;/sparc64 - &release.bugfix; with a serial console and afterwards - compile a custom kernel with the following additional - options: - - device sc -device creator -options KBD_INSTALL_CDEV - - Additionally you have to enable the tty[1-7] - entries in /etc/ttys - like so: - - ttyv0 "/usr/libexec/getty Pc" cons25 on secure -# Virtual terminals -ttyv1 "/usr/libexec/getty Pc" cons25 on secure -ttyv2 "/usr/libexec/getty Pc" cons25 on secure -ttyv3 "/usr/libexec/getty Pc" cons25 on secure -ttyv4 "/usr/libexec/getty Pc" cons25 on secure -ttyv5 "/usr/libexec/getty Pc" cons25 on secure -ttyv6 "/usr/libexec/getty Pc" cons25 on secure -ttyv7 "/usr/libexec/getty Pc" cons25 on secure - - This will yield native support for these keyboards - and frame buffers including VTY switching and X Window System. - Note that this really requires at least &os;/sparc64 - &release.bugfix; otherwise it will not work on - most of the UltraSPARC models. - - - - In case your machine is equipped with a ATI Mach64 - frame buffer (found on-board in e.g. Sun Blade 100/150 - and Sun Ultra 5/10 as well as on Sun PGX8 and Sun PGX64 - add-on cards) or a PS/2 or a USB keyboard update to a - &os;/sparc64 6.0 from June 10 2005 or later. - If you use the stock GENERIC kernel and /etc/ttys - from there no further action is required. - - This will yield native support for these keyboards and frame buffers - including VTY switching and X Window System. - - - - In case your machine is equipped with hardware other than those - mentioned above or you refuse to update to &os;/sparc64 6.0 - you can re-enable the ofw_console(4) driver as a last resort. - To do so build a custom kernel with the following additional - options: - - device ofw_console -device sab -device zs - - and make sure to comment out the following kernel option: - - device uart - - This will yield limited indirect support for - any graphical console hardware, however with poor performance, - and VTY switching as well as X Window System do not work with this. - Note that ofw_console(4) is not really MPSAFE and therefore - can result in panics under certain conditions. - - - - For more details of how to recompile your kernel or - update to &os; 6.0, see - Configuring the &os; Kernel and - The Cutting Edge sections in the &os; Handbook, respectively. + No news. +
-- cgit v1.3