Microsoft Vista Software | Microsoft Vista Books | Linux Books | Ubuntu Books | Ruby On Rails Books

Tuesday, May 09, 2006

FreeBSD 6.1 Released

FreeBSD 6.1 has been released
This release is the next step in the development of the 6.X branch, delivering several performance improvements, many bugfixes, and a few new features. These include:

Addition of a keyboard multiplexer. This allows USB and PS/2 keyboards to coexist without any special options at boot.

Many fixes for filesystem stability. High load stress tests are now run successfully on a regular basis as part of the normal FreeBSD QA process.

Automatic configuration for man Bluetooth devices, as well as automatic support for running WiFi access points.

Addition of drivers for new ethernet and SAS and SATA RAID controllers.

The random(4) entropy device driver is now MPSAFE.

A new sysctl variable security.mac.biba.interfaces_equal which makes all network interfaces be created with the label biba/equal(equal-equal), has been added. This is useful where programs such as dhclient(8) and ppp(8). which initialize network interfaces do not have any labeling support. This variable is set as 0(disabled) by default.

What's New?

Security Advisories
A temporary file vulnerability in texindex(1), which could allow a local attacker to overwrite files in the context of a user running the texindex(1) utility, has been fixed. For more details see security advisory FreeBSD-SA-06:01.texindex.

A temporary file vulnerability in the ee(1) text editor, which could allow a local attacker to overwrite files in the context of a user running ee(1), has been fixed. For more details see security advisory FreeBSD-SA-06:02.ee.

Several vulnerabilities in the cpio(1) utility have been corrected. For more details see security advisory FreeBSD-SA-06:03.cpio.

An error in ipfw(4) IP fragment handling, which could cause a crash, has been fixed. For more details see security advisory FreeBSD-SA-06:04.ipfw.

A potential buffer overflow in the IEEE 802.11 scanning code has been corrected. For more details see security advisory FreeBSD-SA-06:05.80211.

Two instances in which portions of kernel memory could be disclosed to users have been fixed. For more details see security advisory FreeBSD-SA-06:06.kmem.

A logic bug in the IP fragment handling in pf(4), which could cause a crash under certain circumstances, has been fixed. For more details see security advisory FreeBSD-SA-06:07.pf.

A logic bug in the NFS server code, which could cause a crash when the server received a message with a zero-length payload, has been fixed. For more details see security advisory FreeBSD-SA-06:10.nfs.

A programming error in the fast_ipsec(4) implementation results in the sequence number associated with a Security Association not being updated, allowing packets to unconditionally pass sequence number verification checks, has been fixed. For more details see security advisory FreeBSD-SA-06:11.ipsec.

A logic bug that could cause opiepasswd(1) to allow an unprivileged user to configure OPIE authentication for the root user under certain circumstances, has been fixed. For more details see security advisory FreeBSD-SA-06:12.opie.

An asynchronous signal handling vulnerability in sendmail(8), which could allow a remote attacker to execute arbitrary code with the privileges of the user running sendmail, typically root, has been fixed. For more details see security advisory FreeBSD-SA-06:13.sendmail.

An information disclosure issue found in the FreeBSD kernel running on 7th- and 8th-generation AMD processors has been fixed. For more details see security advisory FreeBSD-SA-06:14.fpu.

Kernel Changes
The ddb(4) debugger now supports the show lock command. If the argument has a valid lock class, this displays various information about the lock and calls a new function pointer in lock_class (lc_ddb_show) to dump class-specific information about the lock as well (such as the owner of a mutex or xlock'ed sx lock).

DEFAULTS kernel configuration files for each platform have been added.

The firmware(9) subsystem has been added. This allows to load binary data into the kernel via a specially crafted module.

Contributed Software
BIND has been updated from 9.3.1 to 9.3.2.

hostapd has been updated from version 0.3.9 to version 0.4.8.

GNU Troff has been updated from version 1.19 to version 1.19.2.

sendmail has been updated from 8.13.4 to 8.13.6.

The timezone database has been updated from the tzdata2005l release to the tzdata2005r release.

WPA Supplicant has been updated from version 0.3.9 to version 0.4.8.


Download it here

No comments: