git: 9ab94ece17 - main - Add security advisories affecting 13.5R, 14.3R, 14.4R and 15.0R
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 26 Mar 2026 05:05:58 UTC
The branch main has been updated by philip:
URL: https://cgit.FreeBSD.org/doc/commit/?id=9ab94ece171524958a016bf547e9b67ccaf529ed
commit 9ab94ece171524958a016bf547e9b67ccaf529ed
Author: Philip Paeps <philip@FreeBSD.org>
AuthorDate: 2026-03-26 05:05:17 +0000
Commit: Philip Paeps <philip@FreeBSD.org>
CommitDate: 2026-03-26 05:05:17 +0000
Add security advisories affecting 13.5R, 14.3R, 14.4R and 15.0R
FreeBSD-SA-26:06.tcp affects FreeBSD 14.3R, 14.4R and 15.0R
FreeBSD-SA-26:07.nvmf affects FreeBSD 15.0R
FreeBSD-SA-26:08.rpcsec_gss affects all supported releases
FreeBSD-SA-26:09.pf affects FreeBSD 14.3R, 14.4R and 15.0R
---
website/content/en/releases/13.5R/errata.adoc | 1 +
website/content/en/releases/14.3R/errata.adoc | 3 +++
website/content/en/releases/14.4R/errata.adoc | 6 +++---
website/content/en/releases/15.0R/errata.adoc | 4 ++++
4 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/website/content/en/releases/13.5R/errata.adoc b/website/content/en/releases/13.5R/errata.adoc
index 09005faf4f..ed64d81b15 100644
--- a/website/content/en/releases/13.5R/errata.adoc
+++ b/website/content/en/releases/13.5R/errata.adoc
@@ -52,6 +52,7 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:02.jail.asc[FreeBSD-SA-26:02.jail] |27 January 2026 |Jail escape by a privileged user via nullfs
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:04.jail.asc[FreeBSD-SA-26:04.jail] |24 February 2026 |Jail chroot escape via fd exchange with a different jail
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:05.route.asc[FreeBSD-SA-26:05.route] |24 February 2026 |Local DoS and possible privilege escalation via routing sockets
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation
|===
[[errata]]
diff --git a/website/content/en/releases/14.3R/errata.adoc b/website/content/en/releases/14.3R/errata.adoc
index 5ba196ffe9..81f981732d 100644
--- a/website/content/en/releases/14.3R/errata.adoc
+++ b/website/content/en/releases/14.3R/errata.adoc
@@ -54,6 +54,9 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:02.jail.asc[FreeBSD-SA-26:02.jail] |27 January 2026 |Jail escape by a privileged user via nullfs
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:04.jail.asc[FreeBSD-SA-26:04.jail] |24 February 2026 |Jail chroot escape via fd exchange with a different jail
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:05.route.asc[FreeBSD-SA-26:05.route] |24 February 2026 |Local DoS and possible privilege escalation via routing sockets
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:06.tcp.asc[FreeBSD-SA-26:06.tcp] |26 March 2026 |TCP: remotely exploitable DoS vector (mbuf leak)
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules
|===
[[errata]]
diff --git a/website/content/en/releases/14.4R/errata.adoc b/website/content/en/releases/14.4R/errata.adoc
index 0404bd3ba2..ba2c280ddd 100644
--- a/website/content/en/releases/14.4R/errata.adoc
+++ b/website/content/en/releases/14.4R/errata.adoc
@@ -44,9 +44,9 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/
[width="100%",cols="40%,30%,30%",options="header",]
|===
|Advisory |Date |Topic
-
-|No advisories.||
-
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:06.tcp.asc[FreeBSD-SA-26:06.tcp] |26 March 2026 |TCP: remotely exploitable DoS vector (mbuf leak)
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules
|===
[[errata]]
diff --git a/website/content/en/releases/15.0R/errata.adoc b/website/content/en/releases/15.0R/errata.adoc
index da9874f778..025335df68 100644
--- a/website/content/en/releases/15.0R/errata.adoc
+++ b/website/content/en/releases/15.0R/errata.adoc
@@ -48,6 +48,10 @@ For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:01.openssl.asc[FreeBSD-SA-26:01.openssl] |27 January 2026 |Multiple vulnerabilities in OpenSSL
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:03.blocklistd.asc[FreeBSD-SA-26:03.blocklistd] |10 February 2026 |blocklistd(8) socket leak
|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:05.route.asc[FreeBSD-SA-26:05.route] |24 February 2026 |Local DoS and possible privilege escalation via routing sockets
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:06.tcp.asc[FreeBSD-SA-26:06.tcp] |26 March 2026 |TCP: remotely exploitable DoS vector (mbuf leak)
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:07.nvmf.asc[FreeBSD-SA-26:07.nvmf] |26 March 2026 |Remote denial of service via null pointer dereference
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc[FreeBSD-SA-26:08.rpcsec_gss] |26 March 2026 |Remote code execution via RPCSEC_GSS packet validation
+|link:https://www.FreeBSD.org/security/advisories/FreeBSD-SA-26:09.pf.asc[FreeBSD-SA-26:09.pf] |26 March 2026 |pf silently ignores certain rules
|===
[[errata]]