---
title: "FreeBSD 5.5-RELEASE Errata"
sidenav: download
---

++++


<h3 class="CORPAUTHOR">The FreeBSD Project</h3>

<p class="COPYRIGHT">Copyright &copy; 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 The
FreeBSD Documentation Project</p>

<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
1.69.2.53 2008/04/17 19:10:57 delphij Exp $<br />
</p>

<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
<p>FreeBSD is a registered trademark of the FreeBSD Foundation.</p>

<p>Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or
registered trademarks of Intel Corporation or its subsidiaries in the United States and
other countries.</p>

<p>Sparc, Sparc64, SPARCEngine, and UltraSPARC are trademarks of SPARC International, Inc
in the United States and other countries. Products bearing SPARC trademarks are based
upon architecture developed by Sun Microsystems, Inc.</p>

<p>Many of the designations used by manufacturers and sellers to distinguish their
products are claimed as trademarks. Where those designations appear in this document, and
the FreeBSD Project was aware of the trademark claim, the designations have been followed
by the ``&trade;'' or the ``&reg;'' symbol.</p>
</div>

<hr />
</div>

<blockquote class="ABSTRACT">
<div class="ABSTRACT"><a id="AEN23" name="AEN23"></a>
<p>This document lists errata items for FreeBSD 5.5-RELEASE, containing significant
information discovered after the release or too late in the release cycle to be otherwise
included in the release documentation. This information includes security advisories, as
well as news relating to the software or documentation that could affect its operation or
usability. An up-to-date version of this document should always be consulted before
installing this version of FreeBSD.</p>

<p>This errata document for FreeBSD 5.5-RELEASE will be maintained until the end-of-life
date for the 5-STABLE branch. As of the release date, this date was estimated to be 31
May 2008. The current end-of-life state for the various FreeBSD branches can be found at
<a href="http://security.freebsd.org/"
target="_top">http://security.freebsd.org/</a>.</p>
</div>
</blockquote>

<div class="SECT1">
<hr />
<h2 class="SECT1"><a id="INTRO" name="INTRO">1 Introduction</a></h2>

<p>This errata document contains ``late-breaking news'' about FreeBSD 5.5-RELEASE. Before
installing this version, it is important to consult this document to learn about any
post-release discoveries or problems that may already have been found and fixed.</p>

<p>Any version of this errata document actually distributed with the release (for
example, on a CDROM distribution) will be out of date by definition, but other copies are
kept updated on the Internet and should be consulted as the ``current errata'' for this
release. These other copies of the errata are located at <a
href="http://www.FreeBSD.org/releases/"
target="_top">http://www.FreeBSD.org/releases/</a>, plus any sites which keep up-to-date
mirrors of this location.</p>

<p>Source and binary snapshots of FreeBSD 5-STABLE also contain up-to-date copies of this
document (as of the time of the snapshot).</p>

<p>For a list of all FreeBSD CERT security advisories, see <a
href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a> or <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/"
target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a>.</p>
</div>

<div class="SECT1">
<hr />
<h2 class="SECT1"><a id="SECURITY" name="SECURITY">2 Security Advisories</a></h2>

<p>The following security advisories pertain to FreeBSD 5.5-RELEASE. For more
information, consult the individual advisories available from <a
href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a>.</p>

<div class="INFORMALTABLE"><a id="AEN42" name="AEN42"></a>
<table border="0" frame="void" class="CALSTABLE">
<col width="1*" />
<col width="1*" />
<col width="3*" />
<thead>
<tr>
<th>Advisory</th>
<th>Date</th>
<th>Topic</th>
</tr>
</thead>

<tbody>
<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:15.ypserv.asc"
target="_top">SA-06:15.ypserv</a></td>
<td>31&nbsp;May&nbsp;2006</td>
<td>
<p>Inoperative access controls in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=ypserv&sektion=8&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">ypserv</span>(8)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:16.smbfs.asc"
target="_top">SA-06:16.smbfs</a></td>
<td>31&nbsp;May&nbsp;2006</td>
<td>
<p>smbfs chroot escape</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:17.sendmail.asc"
target="_top">SA-06:17.sendmail</a></td>
<td>14&nbsp;June&nbsp;2006</td>
<td>
<p>Incorrect multipart message handling in Sendmail</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:18.ppp.asc"
target="_top">SA-06:18.ppp</a></td>
<td>23&nbsp;August&nbsp;2006</td>
<td>
<p>Buffer overflow in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=sppp&sektion=4&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">sppp</span>(4)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:19.openssl.asc"
target="_top">SA-06:19.openssl</a></td>
<td>06&nbsp;September&nbsp;2006</td>
<td>
<p>Incorrect PKCS#1 v1.5 padding validation in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=crypto&sektion=3&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">crypto</span>(3)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:20.bind.asc"
target="_top">SA-06:20.bind</a></td>
<td>06&nbsp;September&nbsp;2006</td>
<td>
<p>Denial of Service in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=named&sektion=8&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">named</span>(8)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:21.gzip.asc"
target="_top">SA-06:21.gzip</a></td>
<td>19&nbsp;September&nbsp;2006</td>
<td>
<p>Multiple vulnerabilities in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=gzip&sektion=1&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">gzip</span>(1)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:22.openssh.asc"
target="_top">SA-06:22.openssh</a></td>
<td>30&nbsp;September&nbsp;2006</td>
<td>
<p>Multiple vulnerabilities in OpenSSH</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:23.openssl.asc"
target="_top">SA-06:23.openssl</a></td>
<td>28&nbsp;September&nbsp;2006</td>
<td>
<p>Multiple problems in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=crypto&sektion=3&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">crypto</span>(3)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:25.kmem.asc"
target="_top">SA-06:25.kmem</a></td>
<td>6&nbsp;December&nbsp;2006</td>
<td>
<p>Kernel memory disclosure in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=firewire&sektion=4&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">firewire</span>(4)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:26.gtar.asc"
target="_top">SA-06:26.gtar</a></td>
<td>6&nbsp;December&nbsp;2006</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=gtar&sektion=1&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">gtar</span>(1)</span></a> name
mangling symlink vulnerability</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-07:01.jail.asc"
target="_top">SA-07:01.jail</a></td>
<td>11&nbsp;January&nbsp;2007</td>
<td>
<p>Jail rc.d script privilege escalation</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-07:02.bind.asc"
target="_top">SA-07:02.bind</a></td>
<td>9&nbsp;February&nbsp;2007</td>
<td>
<p>Multiple Denial of Service vulnerabilities in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=named&sektion=8&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">named</span>(8)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-07:03.ipv6.asc"
target="_top">SA-07:03.ipv6</a></td>
<td>26&nbsp;April&nbsp;2007</td>
<td>
<p>IPv6 Routing Header 0 is dangerous</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-07:05.libarchive.asc"
target="_top">SA-07:05.libarchive</a></td>
<td>12&nbsp;July&nbsp;2007</td>
<td>
<p>Errors handling corrupt tar files in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=libarchive&sektion=3&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span
class="REFENTRYTITLE">libarchive</span>(3)</span></a></p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-07:09.random.asc"
target="_top">SA-07:09.random</a></td>
<td>29&nbsp;November&nbsp;2007</td>
<td>
<p>Random value disclosure</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc"
target="_top">SA-07:10.gtar</a></td>
<td>29&nbsp;November&nbsp;2007</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=gtar&sektion=1&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">gtar</span>(1)</span></a>
directory traversal vulnerability</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-08:01.pty.asc"
target="_top">SA-08:01.pty</a></td>
<td>14&nbsp;January&nbsp;2008</td>
<td>
<p>pty snooping</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-08:03.sendfile.asc"
target="_top">SA-08:03.sendfile</a></td>
<td>14&nbsp;February&nbsp;2008</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=sendfile&sektion=2&manpath=FreeBSD+5.5-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">sendfile</span>(2)</span></a>
write-only file permission bypass</p>
</td>
</tr>

<tr>
<td><a href="http://security.FreeBSD.org/advisories/FreeBSD-SA-08:04.ipsec.asc"
target="_top">SA-08:04.ipsec</a></td>
<td>14&nbsp;February&nbsp;2008</td>
<td>
<p>IPsec null pointer dereference panic</p>
</td>
</tr>

<tr>
<td><a href="http://security.freebsd.org/advisories/FreeBSD-SA-08:05.openssh.asc"
target="_top">SA-08:05.openssh</a></td>
<td>17&nbsp;April&nbsp;2008</td>
<td>
<p>OpenSSH X11-forwarding privilege escalation</p>
</td>
</tr>
</tbody>
</table>
</div>
</div>

<div class="SECT1">
<hr />
<h2 class="SECT1"><a id="OPEN-ISSUES" name="OPEN-ISSUES">3 Open Issues</a></h2>

<p>(24 May 2006) The NFSv4 client in 5.5-RELEASE is an unfinished prototype, and there
are a number of issues with it (many documented in the FreeBSD GNATS database) that make
it unusable in many situations. Given the state of 5-STABLE development, it is unlikely
that these will be resolved on this development branch.</p>
</div>

<div class="SECT1">
<hr />
<h2 class="SECT1"><a id="LATE-NEWS" name="LATE-NEWS">4 Late-Breaking News</a></h2>

<p>(31 May 2006) Thanks to the efforts of Paul Saab, torrents for the various FreeBSD
5.5-RELEASE ISO images are now available at <a href="http://torrents.freebsd.org:8080/"
target="_top">http://torrents.freebsd.org:8080/</a>.</p>
</div>
</div>

<hr />
<p align="center"><small>This file, and other release-related documents, can be
downloaded from <a
href="http://www.FreeBSD.org/snapshots/">http://www.FreeBSD.org/snapshots/</a>.</small></p>

<p align="center"><small>For questions about FreeBSD, read the <a
href="http://www.FreeBSD.org/docs.html">documentation</a> before contacting &#60;<a
href="mailto:questions@FreeBSD.org">questions@FreeBSD.org</a>&#62;.</small></p>

<p align="center"><small>All users of FreeBSD 5-STABLE should subscribe to the &#60;<a
href="mailto:stable@FreeBSD.org">stable@FreeBSD.org</a>&#62; mailing list.</small></p>

<p align="center"><small>For questions about this documentation, e-mail &#60;<a
href="mailto:doc@FreeBSD.org">doc@FreeBSD.org</a>&#62;.</small></p>
++++


