From owner-svn-doc-all@freebsd.org Tue Aug 6 22:37:18 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 410DBB050F; Tue, 6 Aug 2019 22:37:18 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4638dp0zBtz3HrZ; Tue, 6 Aug 2019 22:37:18 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0487B2D81; Tue, 6 Aug 2019 22:37:18 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x76MbHAs036481; Tue, 6 Aug 2019 22:37:17 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x76MbH2I036480; Tue, 6 Aug 2019 22:37:17 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201908062237.x76MbH2I036480@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 6 Aug 2019 22:37:17 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53298 - head/en_US.ISO8859-1/htdocs/releases/11.3R X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/11.3R X-SVN-Commit-Revision: 53298 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Aug 2019 22:37:18 -0000 Author: gjb Date: Tue Aug 6 22:37:17 2019 New Revision: 53298 URL: https://svnweb.freebsd.org/changeset/doc/53298 Log: Regen after r350660. Sponsored by: Rubicon Communications, LLC (Netgate) Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html Tue Aug 6 22:36:02 2019 (r53297) +++ head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html Tue Aug 6 22:37:17 2019 (r53298) @@ -13,7 +13,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2019-07-09 13:44:33 UTC by gjb.
Abstract

This document lists errata items for FreeBSD 11.3-RELEASE, + ® symbol.

Last modified on 2019-07-09 09:44:33 EDT by gjb.
Abstract

This document lists errata items for FreeBSD 11.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information @@ -35,8 +35,10 @@ errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 11.3-STABLE also contain up-to-date copies of this document (as of the time of - the snapshot).

For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.

2. Security Advisories

AdvisoryDateTopic
FreeBSD-SA-19:12.telnet24 July 2019

Multiple vulnerabilities

FreeBSD-SA-19:13.pts24 July 2019

Write-after-free vulnerability

FreeBSD-SA-19:14.freebsd3224 July 2019

Kernel memory disclosure

FreeBSD-SA-19:15.mqueuefs24 July 2019

Reference count overflow

FreeBSD-SA-19:16.bhyve24 July 2019

xhci(4) out-of-bounds read

FreeBSD-SA-19:17.fd24 July 2019

Reference count leak

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-19:13.mds24 July 2019

System crash from Intel CPU vulnerability - mitigation

4. Open Issues

2. Security Advisories

AdvisoryDateTopic
FreeBSD-SA-19:12.telnet24 July 2019

Multiple vulnerabilities

FreeBSD-SA-19:13.pts24 July 2019

Write-after-free vulnerability

FreeBSD-SA-19:14.freebsd3224 July 2019

Kernel memory disclosure

FreeBSD-SA-19:15.mqueuefs24 July 2019

Reference count overflow

FreeBSD-SA-19:16.bhyve24 July 2019

xhci(4) out-of-bounds read

FreeBSD-SA-19:17.fd24 July 2019

Reference count leak

FreeBSD-SA-19:18.bzip26 August 2019

Multiple vulnerabilities

FreeBSD-SA-19:19.mldv26 August 2019

Out-of-bounds memor y access

FreeBSD-SA-19:20.bsnmp6 August 2019

Insufficient message length + validation

FreeBSD-SA-19:21.bhyve6 August 2019

Insufficient validation of guest-supplied + data

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-19:13.mds24 July 2019

System crash from Intel CPU vulnerability + mitigation

FreeBSD-EN-19:15.libunwind6 August 2019

Incorrect exception handling

4. Open Issues

  • [2019-07-04] An issue which can cause a crash when connecting to a bhyve(4) instance with a VNC client under certain circumstances had been reported. An errata notice is planned