FreeBSD 5.2 is here
by Mirko Zorz - Tuesday, 13 January 2004.
Building upon the success of FreeBSD 5.1, this release includes:
  • Full Tier-1 support for single and multiprocessor AMD Athlon64 and Opteron systems.
  • Dynamically linked root partition for a smaller installation footprint and better integration with the Name Service Switch subsystem.
  • New and improved driver support for IDE, SATA, and 802.11a/b/g devices, and significantly better integration with the ACPI power management subsystem.
  • Client support for the Network File System version 4 protocol.
  • Experimental first-stage support for multithreaded filtering and forwarding of IP traffic. This also provides the foundation for a fully multi-threaded network stack in the next release of FreeBSD.
  • In-box support for the latest Gnome 2.4 and KDE 3.1 desktops.
Security Advisories

A single-byte buffer overflow in realpath(3) was fixed. Although the fix was committed prior to FreeBSD 5.1-RELEASE (and thus 5.1-RELEASE was not affected), it was not noted in the release documentation. See security advisory FreeBSD-SA-03:08.

A bug that could allow the kernel to attempt delivery of invalid signals has been fixed. The bug could have led to a kernel panic or, under some circumstances, unauthorized modification of kernel memory. For more information, see security advisory FreeBSD-SA-03:09.

A bug in the iBCS2 emulation module, which could result in disclosing the contents of kernel memory, has been fixed. This module is not enabled in FreeBSD by default. For more information, see security advisory FreeBSD-SA-03:10.

A buffer management bug in OpenSSH, which could potentially cause a crash, has been fixed. More information can be found in security advisory FreeBSD-SA-03:12.

A buffer overflow in sendmail has been fixed. More information can be found in security advisory FreeBSD-SA-03:13.

A bug that could allow the kernel to cause resource starvation which eventually results in a system panic in the ARP cache code has been fixed. More information can be found in security advisory FreeBSD-SA-03:14.

Several errors in the OpenSSH PAM challenge/response authentication subsystem have been fixed. The impacts of these bugs vary; details can be found in security advisory FreeBSD-SA-03:15.

A bug in procfs(5) and linprocfs(5), which could result in disclosing the contents of kernel memory, has been fixed. More information can be found in security advisory FreeBSD-SA-03:17.

Four separate security flaws in OpenSSL, which could allow a remote attacker to crash an OpenSSL-using application or to execute arbitrary code with the privileges of the application, have been fixed. More information can be found in security advisory FreeBSD-SA-03:18.

A potential denial of service in BIND has been fixed. For more information, see security advisory FreeBSD-SA-03:19.

Spotlight

Almost 1 in 10 Android apps are now malware

Posted on 28 July 2014.  |  Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses. This is a 153% increase from the number of infected files in 2013.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //