From nobody Thu Apr 30 01:31:46 2026 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4g5c8m0fBnz6cLrN for ; Thu, 30 Apr 2026 01:31:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R13" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4g5c8m03FMz4MqY for ; Thu, 30 Apr 2026 01:31:52 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1777512712; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=kHVKkNCB4FHoCOnMUJWdZwe9NW0WCHIA0fYuWRTjycg=; b=x308S4BwORCzX+cGcW5htOj7q/bKFWpFBPyj7s6P5FK5jn20TANHaetxAIhXTs0KFPmGz4 G6mLPyyzJnI1estCXIcCHOhIKUiq8EqcWmz/wB6KprQDnOQ55arxGf8FLy5ecLl6tn0Uw/ YRvjLqXwxQTqjk3/EZltAtE2S9+4GLEky8jca5rplGo8v+RNfvJxSZDBEjU6FTUw7i4fIs eVQ5LKWtRKiQlIQ6Q1XoyhfsqjLmCaBiUIegv5QWuYIq0qIC0BgTLPpCrKgTYZu+ZCXnT/ xbdqSIKsbIjUpcM978saxSGX8/jNFeMytv6BX3T5I1+PJRqYjbv8f9sJ+ZzK4Q== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1777512712; a=rsa-sha256; cv=none; b=QLfEbaDU147HZyGx1x+/UClsFGv24+K7ymvAwF10kMdB3RPrSOLUKpvnsXIf9GBpet92Qx yTiUpstOUcQNIsAAUJq8ACiwQe8JRHXKTAyywwsnw40jM0TQp9vUqalR4AiqYCMeSzEoi4 JfnQeRsd1FuWAaJiNw/nU02lNgMalHQJ7GQVOxH6aKSwGAP42asQx1GP53HUmy96Xl3MMA FQb8M+uhrLrymGNacPnxipwWhZIcwsM5ruVgJ2IrnbrIzMQaSRzi2hsi+CZ5J5akbLMRx+ zHRzDPcLhPA2n6Dspf2QceZl8So9hGPrH8L17vgrNyrGE4Rtvi+p5OP4e0TAEA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1777512712; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=kHVKkNCB4FHoCOnMUJWdZwe9NW0WCHIA0fYuWRTjycg=; b=l1fOgCZLmSy7HoFVQgk/CU/aqlQI6WL9Oy3vCPR2XTu8Kk/0qyntFOxXFgHZ7TQPMrlnfs yyeh3Nic80SoqeiIJBe4TfZ+R1BtidvSFPSYmELiF3nLNL7Gi+Hb8BA5qoRztM0rNieqbT WF/YDOjDXePqNRv1PWr85MgyYGyLv9ZT97hEY+ILcs867K4+n7/Ki3SbtbYGhUNFeUdgDF 6u9qbNZmlfOUyo96QY1c+vMRvUdYom/CpWuAbaPHBTNVfgF+ak3Andn4jwlgqZj3kl8v9f 4hsdFk1GsxenN3aLn3bCrjjG4iTbO9HJdrfHdLw4ntjkGDNnNLDJ1uwnU679mg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) by mxrelay.nyi.freebsd.org (Postfix) with ESMTP id 4g5c8l6ZqBz14cq for ; Thu, 30 Apr 2026 01:31:51 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from git (uid 1279) (envelope-from git@FreeBSD.org) id 3ad85 by gitrepo.freebsd.org (DragonFly Mail Agent v0.13+ on gitrepo.freebsd.org); Thu, 30 Apr 2026 01:31:46 +0000 To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Philip Paeps Subject: git: f6ce52f505 - main - Add security advisories affecting 13.5R, 14.3R, 14.4R and 15.0R List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: philip X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: f6ce52f50591bdb84c5b866bf75501b12048c55f Auto-Submitted: auto-generated Date: Thu, 30 Apr 2026 01:31:46 +0000 Message-Id: <69f2b102.3ad85.3b745439@gitrepo.freebsd.org> The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/doc/commit/?id=f6ce52f50591bdb84c5b866bf75501b12048c55f commit f6ce52f50591bdb84c5b866bf75501b12048c55f Author: Philip Paeps AuthorDate: 2026-04-30 01:28:08 +0000 Commit: Philip Paeps CommitDate: 2026-04-30 01:28:08 +0000 Add security advisories affecting 13.5R, 14.3R, 14.4R and 15.0R FreeBSD-SA-26:12.dhclient affects all supported releases FreeBSD-SA-26:13.exec affects all supported releases FreeBSD-SA-26:14.pf affects all supported releases FreeBSD-SA-26:15.dhclient affects all supported releases FreeBSD-SA-26:16.libnv affects all supported releases FreeBSD-SA-26:17.libnv affects all supported releases --- website/content/en/releases/13.5R/errata.adoc | 6 ++++++ website/content/en/releases/14.3R/errata.adoc | 6 ++++++ website/content/en/releases/14.4R/errata.adoc | 6 ++++++ website/content/en/releases/15.0R/errata.adoc | 6 ++++++ 4 files changed, 24 insertions(+) diff --git a/website/content/en/releases/13.5R/errata.adoc b/website/content/en/releases/13.5R/errata.adoc index e8751c59c3..bce64dd752 100644 --- a/website/content/en/releases/13.5R/errata.adoc +++ b/website/content/en/releases/13.5R/errata.adoc @@ -55,6 +55,12 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/ |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:10.tty.asc[FreeBSD-SA-26:10.tty] |21 April 2026 |Kernel use-after-free bug in the TIOCNOTTY handler |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:11.amd64.asc[FreeBSD-SA-26:11.amd64] |21 April 2026 |Missing large page handling in pmap_pkru_update_range() +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:12.dhclient.asc[FreeBSD-SA-26:12.dhclient] |29 April 2026 |Remote code execution via malicious DHCP options +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:13.exec.asc[FreeBSD-SA-26:13.exec] |29 April 2026 |Local privilege escalation via execve() +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:14.pf.asc[FreeBSD-SA-26:14.pf] |29 April 2026 |pf can overflow the stack parsing crafted SCTP packets +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:15.dhclient.asc[FreeBSD-SA-26:15.dhclient] |29 April 2026 |Remotely triggerable out-of-bounds heap write in dhclient +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:16.libnv.asc[FreeBSD-SA-26:16.libnv] |29 April 2026 |Stack overflow via select() file descriptor set overflow +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:17.libnv.asc[FreeBSD-SA-26:17.libnv] |29 April 2026 |Heap overflow in libnv |=== [[errata]] diff --git a/website/content/en/releases/14.3R/errata.adoc b/website/content/en/releases/14.3R/errata.adoc index c5d3ff2eb6..11269e841d 100644 --- a/website/content/en/releases/14.3R/errata.adoc +++ b/website/content/en/releases/14.3R/errata.adoc @@ -59,6 +59,12 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/ |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:10.tty.asc[FreeBSD-SA-26:10.tty] |21 April 2026 |Kernel use-after-free bug in the TIOCNOTTY handler |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:11.amd64.asc[FreeBSD-SA-26:11.amd64] |21 April 2026 |Missing large page handling in pmap_pkru_update_range() +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:12.dhclient.asc[FreeBSD-SA-26:12.dhclient] |29 April 2026 |Remote code execution via malicious DHCP options +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:13.exec.asc[FreeBSD-SA-26:13.exec] |29 April 2026 |Local privilege escalation via execve() +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:14.pf.asc[FreeBSD-SA-26:14.pf] |29 April 2026 |pf can overflow the stack parsing crafted SCTP packets +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:15.dhclient.asc[FreeBSD-SA-26:15.dhclient] |29 April 2026 |Remotely triggerable out-of-bounds heap write in dhclient +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:16.libnv.asc[FreeBSD-SA-26:16.libnv] |29 April 2026 |Stack overflow via select() file descriptor set overflow +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:17.libnv.asc[FreeBSD-SA-26:17.libnv] |29 April 2026 |Heap overflow in libnv |=== [[errata]] diff --git a/website/content/en/releases/14.4R/errata.adoc b/website/content/en/releases/14.4R/errata.adoc index 551d7e6cce..f58b4677d1 100644 --- a/website/content/en/releases/14.4R/errata.adoc +++ b/website/content/en/releases/14.4R/errata.adoc @@ -49,6 +49,12 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/ |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:10.tty.asc[FreeBSD-SA-26:10.tty] |21 April 2026 |Kernel use-after-free bug in the TIOCNOTTY handler |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:11.amd64.asc[FreeBSD-SA-26:11.amd64] |21 April 2026 |Missing large page handling in pmap_pkru_update_range() +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:12.dhclient.asc[FreeBSD-SA-26:12.dhclient] |29 April 2026 |Remote code execution via malicious DHCP options +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:13.exec.asc[FreeBSD-SA-26:13.exec] |29 April 2026 |Local privilege escalation via execve() +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:14.pf.asc[FreeBSD-SA-26:14.pf] |29 April 2026 |pf can overflow the stack parsing crafted SCTP packets +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:15.dhclient.asc[FreeBSD-SA-26:15.dhclient] |29 April 2026 |Remotely triggerable out-of-bounds heap write in dhclient +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:16.libnv.asc[FreeBSD-SA-26:16.libnv] |29 April 2026 |Stack overflow via select() file descriptor set overflow +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:17.libnv.asc[FreeBSD-SA-26:17.libnv] |29 April 2026 |Heap overflow in libnv |=== [[errata]] diff --git a/website/content/en/releases/15.0R/errata.adoc b/website/content/en/releases/15.0R/errata.adoc index da400909ce..f891ed725f 100644 --- a/website/content/en/releases/15.0R/errata.adoc +++ b/website/content/en/releases/15.0R/errata.adoc @@ -54,6 +54,12 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/ |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:10.tty.asc[FreeBSD-SA-26:10.tty] |21 April 2026 |Kernel use-after-free bug in the TIOCNOTTY handler |link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:11.amd64.asc[FreeBSD-SA-26:11.amd64] |21 April 2026 |Missing large page handling in pmap_pkru_update_range() +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:12.dhclient.asc[FreeBSD-SA-26:12.dhclient] |29 April 2026 |Remote code execution via malicious DHCP options +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:13.exec.asc[FreeBSD-SA-26:13.exec] |29 April 2026 |Local privilege escalation via execve() +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:14.pf.asc[FreeBSD-SA-26:14.pf] |29 April 2026 |pf can overflow the stack parsing crafted SCTP packets +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:15.dhclient.asc[FreeBSD-SA-26:15.dhclient] |29 April 2026 |Remotely triggerable out-of-bounds heap write in dhclient +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:16.libnv.asc[FreeBSD-SA-26:16.libnv] |29 April 2026 |Stack overflow via select() file descriptor set overflow +|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:17.libnv.asc[FreeBSD-SA-26:17.libnv] |29 April 2026 |Heap overflow in libnv |=== [[errata]]