From nobody Wed Apr 22 02:04:24 2026 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4g0jG108FZz6b7W4 for ; Wed, 22 Apr 2026 02:04:25 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R13" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4g0jG06Kf6z3rXb for ; Wed, 22 Apr 2026 02:04:24 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1776823464; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=FnIhNEyR5Dg5orfXIqAeHclBuCTueqHrYVWi+QjyLxY=; b=pjNlkqvpjkrRFvfQ4kaLW5ZQ1KWThfEDGScHckCmXVtaXMGm12I+aYsCSJcSjZeNFoE6ZL 5+iI+bXPE87OHfrOUGdr2swSB+Lup0PpKHvFsnbu3QksN7r57mDiajFhzy2eJ4SRjEyZfb g15UT3o6a7Oa7efhsAe7P7FwNqB0MdUoSw4KgFShTfI1BgaDRQkNlfQ887D67bC/Dm2a7I tVaynJMYnluWfhT1lDPRgeLCSK9NBlPsxNQLMHeg+MSWHr5lvv5UCZaEb3pvcDfdTIxL4m j600y1cxJ4Z77q5fAqDoXfohusy4F1Xj7FyP92iAU//Cl4U/KjMObg/ibsm0rw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1776823464; a=rsa-sha256; cv=none; b=e9lTUK2yIRtJWXan1tHNYY5R3B97FJ/q9dcSKM1w7SYe98K8epKNAYHROIZI0UmQH/SQf+ fe7ksQ9IlaL86FywOWkxP0+lQeAci6+sn+4sT39fyB2rHY0du5o9yS7iQAZu8FG+IzIxR1 I2w0LIjz1MsXuFS32Fxpb4win2OXCsuSs0KMmAAvZy8qlHSlztf0Oz86aA4MPUIgvrBRLA NM5F5sMrE26K1WWbuBkqJ5jvf+l667osgh0VJXn+NOnqHxHXgeF9cXcfMOE2G6Tl1H2MLW tWNSUORj2DBUkrkR5z/zNyoYfzm8Y22ghLBk7k6D3TIR9wtPtUvvQYR/ganfGg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1776823464; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=FnIhNEyR5Dg5orfXIqAeHclBuCTueqHrYVWi+QjyLxY=; b=TiE0RNCN9m+/iFAe3KjK76JPtv1uAuzDD7FnsSyM+VXhrfunf/5RspaJDPgh9R8eaZCUrQ p5GMNqIiernXf8lFhOMK7X7MxIMJERjMB47SLedQvTA1ZuJxFd6PJTHDwP94f1bgWvTJYy hKyQblfk4WiHR06WEJuvj/Vbxf1Ow0logyFhQs4FgoVyB52lpbKJRnWAFk+tcGzmHfd1bc 0AhyNuiE9J7CVJVBNWIEbBqQlB7sKDMtLg1RinU/7pibLffLhHdVie4IT7Lb9ZrPSjsqfT ZVWWG1z2AWVpN7eZ7GD8WoboWh77SlSLacRzuKlpuNTeeENvREDKnvqYpbtrrg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) by mxrelay.nyi.freebsd.org (Postfix) with ESMTP id 4g0jG04sNGz1950 for ; Wed, 22 Apr 2026 02:04:24 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from git (uid 1279) (envelope-from git@FreeBSD.org) id 26abb by gitrepo.freebsd.org (DragonFly Mail Agent v0.13+ on gitrepo.freebsd.org); Wed, 22 Apr 2026 02:04:24 +0000 To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Philip Paeps Subject: git: 2eaf739eec - main - Add security advisories affecting 13.5R, 14.3R, 14.4R and 15.0R List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: philip X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 2eaf739eec9b5525be88a6b33e59a8468e500bfb Auto-Submitted: auto-generated Date: Wed, 22 Apr 2026 02:04:24 +0000 Message-Id: <69e82ca8.26abb.52c9f7f3@gitrepo.freebsd.org> The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/doc/commit/?id=2eaf739eec9b5525be88a6b33e59a8468e500bfb commit 2eaf739eec9b5525be88a6b33e59a8468e500bfb Author: Philip Paeps AuthorDate: 2026-04-22 02:00:04 +0000 Commit: Philip Paeps CommitDate: 2026-04-22 02:00:04 +0000 Add security advisories affecting 13.5R, 14.3R, 14.4R and 15.0R FreeBSD-SA-26:10.tty affects all supported releases FreeBSD-SA-26:11.amd64 affects all supported releases --- website/content/en/releases/13.5R/errata.adoc | 2 ++ website/content/en/releases/14.3R/errata.adoc | 2 ++ website/content/en/releases/14.4R/errata.adoc | 2 ++ website/content/en/releases/15.0R/errata.adoc | 2 ++ 4 files changed, 8 insertions(+) diff --git a/website/content/en/releases/13.5R/errata.adoc b/website/content/en/releases/13.5R/errata.adoc index ed64d81b15..8a15a76b72 100644 --- a/website/content/en/releases/13.5R/errata.adoc +++ b/website/content/en/releases/13.5R/errata.adoc @@ -53,6 +53,8 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/ |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:04.jail.asc[FreeBSD-SA-26:04.jail] |24 February 2026 |Jail chroot escape via fd exchange with a different jail |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:05.route.asc[FreeBSD-SA-26:05.route] |24 February 2026 |Local DoS and possible privilege escalation via routing sockets |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:10.tty.asc[FreeBSD-SA-26:10.tty] |21 April 2026 |Kernel use-after-free bug in the TIOCNOTTY handler +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:11.amd64.asc[FreeBSD-SA-26:11.amd64] |21 April 2026 |Missing large page handling in pmap_pkru_update_range() |=== [[errata]] diff --git a/website/content/en/releases/14.3R/errata.adoc b/website/content/en/releases/14.3R/errata.adoc index 81f981732d..2a89064172 100644 --- a/website/content/en/releases/14.3R/errata.adoc +++ b/website/content/en/releases/14.3R/errata.adoc @@ -57,6 +57,8 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/ |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:06.tcp.asc[FreeBSD-SA-26:06.tcp] |26 March 2026 |TCP: remotely exploitable DoS vector (mbuf leak) |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:10.tty.asc[FreeBSD-SA-26:10.tty] |21 April 2026 |Kernel use-after-free bug in the TIOCNOTTY handler +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:11.amd64.asc[FreeBSD-SA-26:11.amd64] |21 April 2026 |Missing large page handling in pmap_pkru_update_range() |=== [[errata]] diff --git a/website/content/en/releases/14.4R/errata.adoc b/website/content/en/releases/14.4R/errata.adoc index ba2c280ddd..c49bd182f6 100644 --- a/website/content/en/releases/14.4R/errata.adoc +++ b/website/content/en/releases/14.4R/errata.adoc @@ -47,6 +47,8 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/ |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:06.tcp.asc[FreeBSD-SA-26:06.tcp] |26 March 2026 |TCP: remotely exploitable DoS vector (mbuf leak) |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:10.tty.asc[FreeBSD-SA-26:10.tty] |21 April 2026 |Kernel use-after-free bug in the TIOCNOTTY handler +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:11.amd64.asc[FreeBSD-SA-26:11.amd64] |21 April 2026 |Missing large page handling in pmap_pkru_update_range() |=== [[errata]] diff --git a/website/content/en/releases/15.0R/errata.adoc b/website/content/en/releases/15.0R/errata.adoc index 025335df68..3e0197ff8c 100644 --- a/website/content/en/releases/15.0R/errata.adoc +++ b/website/content/en/releases/15.0R/errata.adoc @@ -52,6 +52,8 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/ |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:07.nvmf.asc[FreeBSD-SA-26:07.nvmf] |26 March 2026 |Remote denial of service via null pointer dereference |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:10.tty.asc[FreeBSD-SA-26:10.tty] |21 April 2026 |Kernel use-after-free bug in the TIOCNOTTY handler +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:11.amd64.asc[FreeBSD-SA-26:11.amd64] |21 April 2026 |Missing large page handling in pmap_pkru_update_range() |=== [[errata]]