Date: Wed, 29 Apr 2026 18:11:26 +0000 From: Gordon Tetlow <gordon@FreeBSD.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org Subject: git: 51a06c2348 - main - Add EN-26:08 through EN-26:10 and SA-26:12 through SA-26:17. Message-ID: <69f249ce.312df.21c6eb51@gitrepo.freebsd.org>
index | next in thread | raw e-mail
The branch main has been updated by gordon: URL: https://cgit.FreeBSD.org/doc/commit/?id=51a06c23483710cfe93554cfd4f3b109be17fbc1 commit 51a06c23483710cfe93554cfd4f3b109be17fbc1 Author: Gordon Tetlow <gordon@FreeBSD.org> AuthorDate: 2026-04-29 18:10:38 +0000 Commit: Gordon Tetlow <gordon@FreeBSD.org> CommitDate: 2026-04-29 18:10:38 +0000 Add EN-26:08 through EN-26:10 and SA-26:12 through SA-26:17. Approved by: so --- website/data/security/advisories.toml | 24 + website/data/security/errata.toml | 12 + .../security/advisories/FreeBSD-EN-26:08.pf.asc | 139 + .../advisories/FreeBSD-EN-26:09.tzdata.asc | 179 ++ .../security/advisories/FreeBSD-EN-26:10.amd64.asc | 155 + .../advisories/FreeBSD-SA-26:12.dhclient.asc | 155 + .../security/advisories/FreeBSD-SA-26:13.exec.asc | 150 + .../security/advisories/FreeBSD-SA-26:14.pf.asc | 168 ++ .../advisories/FreeBSD-SA-26:15.dhclient.asc | 159 ++ .../security/advisories/FreeBSD-SA-26:16.libnv.asc | 152 + .../security/advisories/FreeBSD-SA-26:17.libnv.asc | 156 + website/static/security/patches/EN-26:08/pf.patch | 69 + .../static/security/patches/EN-26:08/pf.patch.asc | 17 + .../patches/EN-26:09/tzdata-2026b-144.patch | 681 +++++ .../patches/EN-26:09/tzdata-2026b-144.patch.asc | 17 + .../security/patches/EN-26:09/tzdata-2026b.patch | 3015 ++++++++++++++++++++ .../patches/EN-26:09/tzdata-2026b.patch.asc | 17 + .../static/security/patches/EN-26:10/amd64.patch | 34 + .../security/patches/EN-26:10/amd64.patch.asc | 17 + .../security/patches/SA-26:12/dhclient.patch | 28 + .../security/patches/SA-26:12/dhclient.patch.asc | 17 + .../static/security/patches/SA-26:13/exec.patch | 11 + .../security/patches/SA-26:13/exec.patch.asc | 17 + .../static/security/patches/SA-26:14/pf-135.patch | 165 ++ .../security/patches/SA-26:14/pf-135.patch.asc | 17 + .../static/security/patches/SA-26:14/pf-143.patch | 165 ++ .../security/patches/SA-26:14/pf-143.patch.asc | 17 + .../static/security/patches/SA-26:14/pf-144.patch | 98 + .../security/patches/SA-26:14/pf-144.patch.asc | 17 + .../static/security/patches/SA-26:14/pf-150.patch | 163 ++ .../security/patches/SA-26:14/pf-150.patch.asc | 17 + .../security/patches/SA-26:15/dhclient.patch | 13 + .../security/patches/SA-26:15/dhclient.patch.asc | 17 + .../static/security/patches/SA-26:16/libnv.patch | 34 + .../security/patches/SA-26:16/libnv.patch.asc | 17 + .../static/security/patches/SA-26:17/libnv.patch | 25 + .../security/patches/SA-26:17/libnv.patch.asc | 17 + 37 files changed, 6171 insertions(+) diff --git a/website/data/security/advisories.toml b/website/data/security/advisories.toml index 611ec14b67..3c30ea9bd5 100644 --- a/website/data/security/advisories.toml +++ b/website/data/security/advisories.toml @@ -1,6 +1,30 @@ # Sort advisories by year, month and day # $FreeBSD$ +[[advisories]] +name = "FreeBSD-SA-26:17.libnv" +date = "2026-04-29" + +[[advisories]] +name = "FreeBSD-SA-26:16.libnv" +date = "2026-04-29" + +[[advisories]] +name = "FreeBSD-SA-26:15.dhclient" +date = "2026-04-29" + +[[advisories]] +name = "FreeBSD-SA-26:14.pf" +date = "2026-04-29" + +[[advisories]] +name = "FreeBSD-SA-26:13.exec" +date = "2026-04-29" + +[[advisories]] +name = "FreeBSD-SA-26:12.dhclient" +date = "2026-04-29" + [[advisories]] name = "FreeBSD-SA-26:11.amd64" date = "2026-04-21" diff --git a/website/data/security/errata.toml b/website/data/security/errata.toml index f14683655b..1614ad90a8 100644 --- a/website/data/security/errata.toml +++ b/website/data/security/errata.toml @@ -1,6 +1,18 @@ # Sort errata notices by year, month and day # $FreeBSD$ +[[notices]] +name = "FreeBSD-EN-26:10.amd64" +date = "2026-04-29" + +[[notices]] +name = "FreeBSD-EN-26:09.tzdata" +date = "2026-04-29" + +[[notices]] +name = "FreeBSD-EN-26:08.pf" +date = "2026-04-29" + [[notices]] name = "FreeBSD-EN-26:07.pkgbase" date = "2026-04-21" diff --git a/website/static/security/advisories/FreeBSD-EN-26:08.pf.asc b/website/static/security/advisories/FreeBSD-EN-26:08.pf.asc new file mode 100644 index 0000000000..c5a4f42406 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-26:08.pf.asc @@ -0,0 +1,139 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-26:08.pf Errata Notice + The FreeBSD Project + +Topic: Incorrect duplicate rule detection for automatic tables + +Category: core +Module: pf +Announced: 2026-04-29 +Credits: Michael Sinatra +Affects: FreeBSD 15.0 +Corrected: 2026-04-26 10:12:28 UTC (stable/15, 15.0-STABLE) + 2026-04-29 14:48:24 UTC (releng/15.0, 15.0-RELEASE-p7) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +pf is an Internet Protocol packet filter originally written for OpenBSD. +While loading its configuration, pf hashes rules and silently drops +duplicates as an optimisation. Only the first rule with the same hash is +considered. + +II. Problem Description + +While checking for duplicate rules pf did not distinguish automatically +created tables from each other. As a result some of those rules may have +unexpectedly not been loaded. + +III. Impact + +The ruleset loaded in the kernel might not match the configured ruleset. + +IV. Workaround + +This problem only affects rules with tables created by the pfctl rules +optimiser. Either disable ruleset optimisation ('set ruleset-optimization +none'), or avoid constructs which would be optimisised into a table (e.g. by +manually creating such tables). + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot the system. + +Perform one of the following: + +1) To update your system installed from base system packages: + +Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64 +platforms, which were installed using base system packages, can be updated +via the pkg(8) utility: + +# pkg upgrade -r FreeBSD-base +# shutdown -r now + +2) To update your system installed from binary distribution sets: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, which were not installed using base +system packages, can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r now + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-26:08/pf.patch +# fetch https://security.FreeBSD.org/patches/EN-26:08/pf.patch.asc +# gpg --verify pf.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/15/ fdcc60f52841 stable/15-n283345 +releng/15.0/ d91d13c12484 releng/15.0-n281025 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-26:08.pf.asc> +-----BEGIN PGP SIGNATURE----- + +iQJPBAEBCgA5FiEEthUnfoEIffdcgYM7bljekB8AGu8FAmnySREbFIAAAAAABAAO +bWFudTIsMi41KzEuMTIsMCwzAAoJEG5Y3pAfABrvIygQAKSJuU4Ka3cRRqje85kA +O03aC+IoU1YOaepkziI4TKxwKNSc7wh4S0xlCBiNXDqM9JUs20XbG47JT1GDUKP9 +TNDymnUxNGjzmgEwbh/ZQvTKGqib2d0c4fhvLWMSg6FAbET8EnkyniM5A55QfUX0 +YwsTFRk27K09AcCW8gpoRgAjJBhdlN18SvvlE8CQ57xpUQnukFJp+zh37OCGkRVO +fciwOmEYmsrIur9vde7RX/ohBX2RbB3QrMQh9x4td+RpwUGfEkZ4oei+aJWJazVW +VimwkJXXSl2Hdn4V/eNPKj3viSu40tgTPQelSgh1qFPxLMTVvRf1I8VlKYTFHV1O +0EGGsya4nE1pEYWL1CWh/9v2BoTiV7OVDEcu1prc9p/5dHv4cDNaaRf5ZMN8f7Sp +S1X1eHY/eJ59ayBCPNShOMTf36hvMuQT9hBXdBArb6MpeGLubWFtGsHkaFZtoBvj +QnpH4uTxeDMTZANqoM3t6QqrwDUEKBn9ai25k/k9a7vqYwrcLUo4WsLauiwhAbz0 +7bmnXUE+gbn5qlX03UFLqANA7OujEjuBxc5+vmlJXK+1CARMcQToDEdMojhkBwbN +xgxGtyol/Pq3MwvGZyKMlQii0xre2sA1Gqv41k4l7oPukU8DRAOFZQ9nDBmIB0NW +s9JLPOImH1NE9iA05ezJk46Q +=7VtI +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-26:09.tzdata.asc b/website/static/security/advisories/FreeBSD-EN-26:09.tzdata.asc new file mode 100644 index 0000000000..09b3d387db --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-26:09.tzdata.asc @@ -0,0 +1,179 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-26:09.tzdata Errata Notice + The FreeBSD Project + +Topic: Timezone database information update + +Category: contrib +Module: zoneinfo +Announced: 2026-04-29 +Affects: All supported versions of FreeBSD. +Corrected: 2026-03-05 01:36:15 UTC (stable/15, 15.0-STABLE) + 2026-04-29 14:48:25 UTC (releng/15.0, 15.0-RELEASE-p7) + 2026-03-05 01:33:16 UTC (stable/14, 14.4-STABLE) + 2026-04-29 14:49:38 UTC (releng/14.4, 14.4-RELEASE-p3) + 2026-04-29 14:49:18 UTC (releng/14.3, 14.3-RELEASE-p12) + 2026-03-05 01:33:52 UTC (stable/13, 13.5-STABLE) + 2026-04-29 14:50:16 UTC (releng/13.5, 13.5-RELEASE-p13) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +The IANA Time Zone Database (often called tz or zoneinfo) contains code and +data that represent the history of local time for many representative +locations around the globe. It is updated periodically to reflect changes +made by political bodies to time zone boundaries, UTC offsets, and +daylight-saving rules. + +FreeBSD releases install the IANA Time Zone Database in /usr/share/zoneinfo. +The tzsetup(8) utility allows the user to specify the default local time +zone. Based on the selected time zone, tzsetup(8) copies one of the files +from /usr/share/zoneinfo to /etc/localtime. A time zone may also be selected +for an individual process by setting its TZ environment variable to a desired +time zone name. + +II. Problem Description + +Several changes to future and past timestamps have been recorded in the IANA +Time Zone Database after previous FreeBSD releases were released. This +affects many users in different parts of the world. Because of these +changes, the data in the zoneinfo files need to be updated. If the local +timezone on the running system is affected, tzsetup(8) needs to be run to +update /etc/localtime. + +III. Impact + +An incorrect time will be displayed on a system configured to use one of the +affected time zones if the /usr/share/zoneinfo and /etc/localtime files are +not updated, and all applications on the system that rely on the system time, +such as cron(8) and syslog(8), will be affected. + +IV. Workaround + +The system administrator can install an updated version of the IANA Time Zone +Database from the misc/zoneinfo port and run tzsetup(8). + +Applications that store and display times in Coordinated Universal Time (UTC) +are not affected. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +Please note that some third party software, for instance PHP, Ruby, Java, +Perl and Python, may be using different zoneinfo data sources, in such cases +this software must be updated separately. Software packages that are +installed via binary packages can be upgraded by executing 'pkg upgrade'. + +Following the instructions in this Errata Notice will only update the IANA +Time Zone Database installed in /usr/share/zoneinfo. + +Perform one of the following: + +1) To update your system installed from base system packages: + +Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64 +platforms, which were installed using base system packages, can be updated +via the pkg(8) utility: + +# pkg upgrade -r FreeBSD-base + +2) To update your system installed from binary distribution sets: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, which were not installed using base +system packages, can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 13.5, FreeBSD 14.3, and FreeBSD 15.0] +# fetch https://security.FreeBSD.org/patches/EN-26:09/tzdata-2026b.patch +# fetch https://security.FreeBSD.org/patches/EN-26:09/tzdata-2026b.patch.asc +# gpg --verify tzdata-2026b.patch.asc + +[FreeBSD 14.4] +# fetch https://security.FreeBSD.org/patches/EN-26:09/tzdata-2026b-144.patch +# fetch https://security.FreeBSD.org/patches/EN-26:09/tzdata-2026b-144.patch.asc +# gpg --verify tzdata-2026b-144.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. + +Restart all the affected applications and daemons, or reboot the system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/15/ 564480f108e7 stable/15-n282573 +releng/15.0/ 183f96697f82 releng/15.0-n281026 +stable/14/ 4830cb713ed8 stable/14-n273807 +releng/14.4/ 677aeab69b13 releng/14.4-n273688 +releng/14.3/ 1d3ca32f88f2 releng/14.3-n271488 +stable/13/ c0b2aff48ff3 stable/13-n259815 +releng/13.5/ f7e6b9f128e3 releng/13.5-n259213 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + +<URL:https://github.com/eggert/tz/blob/2026b/NEWS> +<URL:https://github.com/eggert/tz/blob/2026a/NEWS> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-26:09.tzdata.asc> +-----BEGIN PGP SIGNATURE----- + +iQJPBAEBCgA5FiEEthUnfoEIffdcgYM7bljekB8AGu8FAmnySRMbFIAAAAAABAAO +bWFudTIsMi41KzEuMTIsMCwzAAoJEG5Y3pAfABrvVGsP/20IASIuyeEzCQSGN/oA +u/t7PXGIHre/ApxXzQ+K2A4Sn92f0VAG+SG4g4zdLAI+kQXfdCGq2b0oJoEzQg64 +fLAMF772Pc9GMijEXcTMU76hVqD9RiQncOH8w5ODWe3Lmszr8y0foFC9LU0IyccC +5MbHIv9vRRIe0Wpgp33XMLU2mjND+4LVgKxGHpqz86Rqo9zjLAbW1aiSK9mJBE5n +BHWWbRpG8lFzm3jx0m7bIZYaghnnuyrg5TV7bZBbMPg64WTFrBrEyS3QlI9addp/ +hwxwUY2F14fyyjgnlVOVNsMX/BaDh/c6W8R/EyFVxADjAQazQqJJxO/DTwlxqnbu +gaiwdn64vPfR9xJgglsaDutvytEXUMcNuNpDWu8OZUWx1Vd+OnJKLu0m6JC0LLuA +LFbq72HyTNoI0I9kpjkY5XBcuPx4DZHzG3WgvgYJ7tO1myUDaKjawAc2khxHsvpf +JIsY85kBBEoqXEJiLb5DHVO+2Airldz/8DlHVUMWmds9QrQVo7bQzwRpFMZDDc3b +Psp0U9FRe87eQLhgwMn9dRi7QHRRcjAfcqOb3HRHMVRZ2MNq0O9vIRGMyfLzOqwn +iweujCGTmSB9tph/StkKv/n+4zzxLOvyJcmSYcz3zLuFq9t2qOeRtQnhD4tn4wLW +Kq2ZK/k/IL4g1lI6rg4C3BmF +=Mc5t +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-26:10.amd64.asc b/website/static/security/advisories/FreeBSD-EN-26:10.amd64.asc new file mode 100644 index 0000000000..30eff34440 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-26:10.amd64.asc @@ -0,0 +1,155 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-26:10.amd64 Errata Notice + The FreeBSD Project + +Topic: TLB invalidation bug on AMD systems with INVLPGB + +Category: core +Module: vm +Announced: 2026-04-29 +Affects: FreeBSD 14.3 and later +Corrected: 2026-04-23 13:48:45 UTC (stable/15, 15.0-STABLE) + 2026-04-29 14:48:26 UTC (releng/15.0, 15.0-RELEASE-p7) + 2026-04-23 13:49:23 UTC (stable/14, 14.4-STABLE) + 2026-04-29 14:49:39 UTC (releng/14.4, 14.4-RELEASE-p3) + 2026-04-29 14:49:19 UTC (releng/14.3, 14.3-RELEASE-p12) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +On multi-core systems, TLB invalidation operations must notify other cores, +as each core maintains a local TLB. On amd64 systems this has historically +been implemented using interprocessor interrupts. Recent AMD CPUs provide +a new instruction, invlpgb, which allows a core to broadcast TLB invalidations +to other cores without need to explicitly raise interrupts. The FreeBSD kernel +makes use of this instruction when available. + +II. Problem Description + +The FreeBSD implementation of ranged TLB invalidation took advantage of a bit +in an invlpgb operand to invalidate consecutive 2M entries, instead of +invalidating purely in increments of 4K pages. The hardware invlpgb +implementation uses the underlying page size to invalidate regardless of the +status of this bit, which may leave a series of 4K mappings intact that should +have been invalidated. + +III. Impact + +Failing to invalidate pages when it required may result in apparent kernel +memory corruption, typically resulting in a kernel panic. Workloads involving +heavy use of kqueue(2) and/or large file descriptor tables seem to trigger +the problem somewhat readily. + +IV. Workaround + +Intel and non-x86 systems are not affected. + +AMD systems that support INVLPGB (reported during the kernel boot process in +"AMD Extended Feature Extensions ID EBX") may set vm.pmap.invlpgb_works=0 in +/boot/loader.conf to work around this issue by disabling the use of invlpgb. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot the system. + +Perform one of the following: + +1) To update your system installed from base system packages: + +Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64 +platforms, which were installed using base system packages, can be updated +via the pkg(8) utility: + +# pkg upgrade -r FreeBSD-base +# shutdown -r +10min "Rebooting for a security update" + +2) To update your system installed from binary distribution sets: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, which were not installed using base +system packages, can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-26:10/amd64.patch +# fetch https://security.FreeBSD.org/patches/EN-26:10/amd64.patch.asc +# gpg --verify amd64.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/15/ 280cfe2264d7 stable/15-n283199 +releng/15.0/ 182c59658218 releng/15.0-n281027 +stable/14/ ff11ae166cd9 stable/14-n274021 +releng/14.4/ b00785205990 releng/14.4-n273689 +releng/14.3/ 3b1365cb816e releng/14.3-n271489 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + +<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=293382> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-26:10.amd64.asc> +-----BEGIN PGP SIGNATURE----- + +iQJPBAEBCgA5FiEEthUnfoEIffdcgYM7bljekB8AGu8FAmnySRcbFIAAAAAABAAO +bWFudTIsMi41KzEuMTIsMCwzAAoJEG5Y3pAfABrv4zAP/3/9no397tY5+uMITwzb +d8RklxyJatGAYnqSQrJCjxm4er+CUijdCb6jUrg2L2hKt8c3KOQctSY5ko2agkZ2 +41ghOeIOU6N9+aiNN4wlqCbgufUXjtBWBBEgOvJHyU1QnSazKDZmGAwWfiTz8Uh7 +QtuRHV/I8LDKpd6UtVC6S6lsKSiDrmMQ6CmDSMiMDEpJO8cM1rKejU/gGSTaiwak +25SvR6z1rgJwh5VFKnT5a7G9Gw3oV04+zWQRoYOotiblg1qUgLAjMxogrIvFQKbR +fQElldSwQl7ErlFjYCBrvDbXzGqlsDDab05ay4361VD92QWQ4o64X5KHR+Rb0yYt +RWfPxfCNA1fNMDjkY1y9ROjGERuNdhJzGl5o2m6TXJl/rUX+BZrWZLTC/68CMy/B +DHrKPMLRD6rOS6AupNK1UfKoRPqha9tdwdofOOD4qr6PQ0UecLyUrUQljlK6QUYm +yUQQzC0eun6SdQihPaHGEXK0oe7MqWJvt7s82DE6EKKR8FJ2aqWfMT7qjV3Y3E7e +TJzJGDsbLoZYtPl8u6OQM2gaxAf5CqSCxU7PvyOsu5/gf89CsakdC6OUBkXh/pAS +wCLDDyqffmgwOi1hE9ACgUOVASRyrITZwP1sqyAVJF8yY3YhxGHImaFrdAJ/yU4Q +xp9Ok7v2qSxueDnMc9C16AFt +=pWDj +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-SA-26:12.dhclient.asc b/website/static/security/advisories/FreeBSD-SA-26:12.dhclient.asc new file mode 100644 index 0000000000..531af13cae --- /dev/null +++ b/website/static/security/advisories/FreeBSD-SA-26:12.dhclient.asc @@ -0,0 +1,155 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-26:12.dhclient Security Advisory + The FreeBSD Project + +Topic: Remote code execution via malicious DHCP options + +Category: core +Module: dhclient +Announced: 2026-04-29 +Credits: Joshua Rogers of AISLE Research Team +Affects: All supported versions of FreeBSD. +Corrected: 2026-04-29 14:47:47 UTC (stable/15, 15.0-STABLE) + 2026-04-29 14:48:28 UTC (releng/15.0, 15.0-RELEASE-p7) + 2026-04-29 14:48:50 UTC (stable/14, 14.4-STABLE) + 2026-04-29 14:49:41 UTC (releng/14.4, 14.4-RELEASE-p3) + 2026-04-29 14:49:22 UTC (releng/14.3, 14.3-RELEASE-p12) + 2026-04-29 14:50:06 UTC (stable/13, 13.5-STABLE) + 2026-04-29 14:50:18 UTC (releng/13.5, 13.5-RELEASE-p13) +CVE Name: CVE-2026-42511 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +dhclient(8) is the default IPv4 DHCP client used on FreeBSD. It is +responsible for contacting DHCP servers on a network segment and for +initialising and configuring network interfaces based on received +information. + +II. Problem Description + +The BOOTP file field is written to the lease file without escaping embedded +double-quotes, allowing injection of arbitrary dhclient.conf directives. +When the lease file is subsequently re-parsed by dhclient, e.g., after a +system restart, an attacker-controlled field from the lease is passed to +dhclient-script(8), which evaluates it. + +III. Impact + +A rogue DHCP server may be able to execute arbirary code as root on a system +running dhclient. + +IV. Workaround + +No workaround is available. Systems not running dhclient(8) are not +affected. + +The attacker needs to be on the same broadcast domain and respond to DHCP +requests. A well-managed network will configure DHCP snooping on switches to +prevent rogue DHCP servers from operating. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system installed from base system packages: + +Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64 +platforms, which were installed using base system packages, can be updated +via the pkg(8) utility: + +# pkg upgrade -r FreeBSD-base + +2) To update your vulnerable system installed from binary distribution sets: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, which were not installed using base +system packages, can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-26:12/dhclient.patch +# fetch https://security.FreeBSD.org/patches/SA-26:12/dhclient.patch.asc +# gpg --verify dhclient.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. + +Restart the applicable daemons, or reboot the system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/15/ 2621f6c5d4ae stable/15-n283377 +releng/15.0/ e7b4fb41aafa releng/15.0-n281029 +stable/14/ b3087e05e848 stable/14-n274076 +releng/14.4/ 73b801e3b5b3 releng/14.4-n273691 +releng/14.3/ dda71167a101 releng/14.3-n271492 +stable/13/ 46c01e4dd102 stable/13-n259859 +releng/13.5/ a2d45189b9ee releng/13.5-n259215 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + +<URL:https://www.cve.org/CVERecord?id=CVE-2026-42511> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:12.dhclient.asc> +-----BEGIN PGP SIGNATURE----- + +iQJPBAEBCgA5FiEEthUnfoEIffdcgYM7bljekB8AGu8FAmnySScbFIAAAAAABAAO +bWFudTIsMi41KzEuMTIsMCwzAAoJEG5Y3pAfABrv/HEQANr71RMaW0408Cp2xZ/n +DN8DsU7vCXPDcZWF/HAl+COurXipEycxnP6pBdm2uCqRGWXmNPkjyA5nyoAM2qYP +9b3rXQHKdrqc0vvbjJuahzqfttwcv1jFQp+8Z8N8TYWUnETprai5VOwZ+7p2caGC +gZg3UkS8qx7+qUZn1c1nOpYgW7AE1cxuBzSM3O/4pyaSnnMGgeUcz/utv+F272rn +/rdDaC1nvH09OKIJOqBxOQ7m7izTBu70P1zhuWmGDAzmvy1sNCUpv325iFBc7B78 +fRvINps878aSqheJqIx2jpeykW+nBjbVpsh++0ZUNjoWQTbZM7WaxNJxD4KjdInW +zvK24qX34aMrY4pS0BjpQ46RTkEIDFnzSYTUAN+33LQ9rQ+1DaUF0UJAlO10XBQ+ +6J1ZDXnSmqOsXu2pnRyXWKrsliz6+j3LOzkJoc2gQFwiDzex20ZJtO3Jd2dVMJ5a +F/jN5SY800LhvCbPFPL4k03xK98n7fLs432jsJOMYtRvY9N62oEbufBj0dCS0S15 +A7Vj537ziRZuGt4xz3vdE48GEBdxm+frPNadS8IurW1gDN4Rr0d5VLfKFwMsiSXr +baVMWTjn6kcfpomYDhl5451lDAyhZ20qFxx9M1lRNj7ploz4khmdv1e1zqENocQd +t4eQrptk4YUgxEIZ0R56b2qf +=h/Vp +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-SA-26:13.exec.asc b/website/static/security/advisories/FreeBSD-SA-26:13.exec.asc new file mode 100644 index 0000000000..3d9a0ea526 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-SA-26:13.exec.asc @@ -0,0 +1,150 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-26:13.exec Security Advisory + The FreeBSD Project + +Topic: Local privilege escalation via execve() + +Category: core +Module: execve(2) +Announced: 2026-04-29 +Credits: Ryan Austin of Calif.io +Affects: All supported versions of FreeBSD. +Corrected: 2026-04-29 14:47:46 UTC (stable/15, 15.0-STABLE) + 2026-04-29 14:48:27 UTC (releng/15.0, 15.0-RELEASE-p7) + 2026-04-29 14:48:49 UTC (stable/14, 14.4-STABLE) + 2026-04-29 14:49:40 UTC (releng/14.4, 14.4-RELEASE-p3) + 2026-04-29 14:49:21 UTC (releng/14.3, 14.3-RELEASE-p12) + 2026-04-29 14:50:05 UTC (stable/13, 13.5-STABLE) + 2026-04-29 14:50:17 UTC (releng/13.5, 13.5-RELEASE-p13) +CVE Name: CVE-2026-7270 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +execve(2) is a system call is used to launch an executable image, including +scripts prefixed with a path to the interpreter. The system call takes a +path to the image as a parameter, followed by extra arguments and environment +variables to be passed to the new image. + +II. Problem Description + +An operator precedence bug in the kernel results in a scenario where a buffer +overflow causes attacker-controlled data to overwrite adjacent execve(2) +argument buffers. + +III. Impact + +The bug may be exploitable by an unprivileged user to obtain superuser +privileges. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot the system. + +Perform one of the following: + +1) To update your vulnerable system installed from base system packages: + +Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64 +platforms, which were installed using base system packages, can be updated +via the pkg(8) utility: + +# pkg upgrade -r FreeBSD-base +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system installed from binary distribution sets: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, which were not installed using base +system packages, can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-26:13/exec.patch +# fetch https://security.FreeBSD.org/patches/SA-26:13/exec.patch.asc +# gpg --verify exec.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/15/ c3e943e78e06 stable/15-n283376 +releng/15.0/ 934b48683c4f releng/15.0-n281028 +stable/14/ ae00a52921ca stable/14-n274075 +releng/14.4/ 943aa64ba91a releng/14.4-n273690 +releng/14.3/ f04c40607b8f releng/14.3-n271491 +stable/13/ d619e3a3c0ec stable/13-n259858 +releng/13.5/ 7c5c37ac8f8f releng/13.5-n259214 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + +<URL:https://www.cve.org/CVERecord?id=CVE-2026-7270> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:13.exec.asc> +-----BEGIN PGP SIGNATURE----- + +iQJPBAEBCgA5FiEEthUnfoEIffdcgYM7bljekB8AGu8FAmnySSobFIAAAAAABAAO +bWFudTIsMi41KzEuMTIsMCwzAAoJEG5Y3pAfABrvjo8QANkZEWuyL/5O51TNbvUj +SSwE2BN/mjpiLVM7bfvsb7/Ow0vnKiQ3o9ABLbk/YHVOPEzWTzzPJ1XY6Jfnje4h +embXMN9hA/DT0QnnoB8HYzckZ4WpV1Ok+yfR25C/Gjbfje9Qb+dbhoS9aXEDrVA9 +5o8OmrsC+cngG053KeCMG5Ja+IEN6ZKleO327J+j7DON84K8QDl8KKT/hEcy5Mx2 +M6aho8YDo/wroc4nSJ6dZYpG7hfKEQRNTRbYrj21VAg2zXz8gOB2bQgiIr9Bb0ha +Kzj/iRapiZDOVu76jpi0clstqDiKEmI3/kf0HNF8B4xWSJ9XL6zfV5EkWCAOzhg6 +Y12Z2RyoWp6Vc35utL7zEuSDvMitEQx4QlhTQRqXoKLgRCnz9OZ8eGhYGiKLrc+Z +FZ3j/l2RM5SXwh70xN1b455t2HBNm/ZDkpjTYhQPgYDq2A8z1K0d63rh6tAhNGjK +NHZ7hFaf1kKAmO/p8AyoQJ0bl36u31JXOVgJ7U2UEm3bdvHF0SQ8Xe61oiHSMifO +dP6Sv//VPEWLqq/oGIplkxJMZ9VAWdiap7/+1lWI72DvFkpb+GdXIPs4fAbIYVwI +MbdcJygSDwjB8fJh4+sdylWAVQJQFkjUeAvn3huCuoEzlAtaE9Urdh0JnibLAYKN +v/drFvMv5zppIn1Ry/knM4vG +=YAct +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-SA-26:14.pf.asc b/website/static/security/advisories/FreeBSD-SA-26:14.pf.asc new file mode 100644 index 0000000000..c5d889135b --- /dev/null +++ b/website/static/security/advisories/FreeBSD-SA-26:14.pf.asc @@ -0,0 +1,168 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-26:14.pf Security Advisory + The FreeBSD Project + +Topic: pf can overflow the stack parsing crafted SCTP packets + +Category: core +Module: pf +Announced: 2026-04-29 +Credits: Igor Gabriel Sousa e Souza +Affects: All supported versions of FreeBSD. +Corrected: 2026-04-29 14:47:50 UTC (stable/15, 15.0-STABLE) + 2026-04-29 14:48:30 UTC (releng/15.0, 15.0-RELEASE-p7) + 2026-04-29 14:48:52 UTC (stable/14, 14.4-STABLE) + 2026-04-29 14:49:44 UTC (releng/14.4, 14.4-RELEASE-p3) + 2026-04-29 14:49:20 UTC (releng/14.3, 14.3-RELEASE-p12) + 2026-04-29 14:50:08 UTC (stable/13, 13.5-STABLE) + 2026-04-29 14:50:20 UTC (releng/13.5, 13.5-RELEASE-p13) +CVE Name: CVE-2026-7164 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +pf is an Internet Protocol packet filter originally written for OpenBSD. +SCTP is a transport protocol with multihome support. + +pf parses SCTP packets to discover additional addresses for SCTP endpoints, +allowing it to create states allowing connections between these additional +addresses. + +II. Problem Description + +Incorrect packet validation allowed unbounded recursion parsing SCTP chunk +parameters. This can eventually result in a stack overflow and panic. + +III. Impact + +Remote attackers can craft packets which cause affected systems to panic. +This affects any system where pf is configured to process traffic, +independent of the configured ruleset. + +IV. Workaround + +No workaround is available. Systems not using pf are not affected. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot the system. + +Perform one of the following: + +1) To update your vulnerable system installed from base system packages: + +Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64 *** 5469 LINES SKIPPED ***home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69f249ce.312df.21c6eb51>
