1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
|
<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook XML V5.0-Based Extension//EN"
"http://www.FreeBSD.org/XML/share/xml/freebsd50.dtd" [
<!ENTITY % release PUBLIC "-//FreeBSD//ENTITIES Release Specification//EN"
"http://www.FreeBSD.org/release/XML/release.ent">
%release;
]>
<article xmlns="http://docbook.org/ns/docbook"
xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0">
<info>
<title>&os; &release.prev; Errata </title>
<author><orgname>The &os; Project</orgname></author>
<pubdate>$FreeBSD$</pubdate>
<copyright>
<year>2014</year>
<holder role="mailto:doc@FreeBSD.org">The &os; Documentation
Project</holder>
</copyright>
<legalnotice xml:id="trademarks" role="trademarks">
&tm-attrib.freebsd;
&tm-attrib.intel;
&tm-attrib.sparc;
&tm-attrib.general;
</legalnotice>
<abstract>
<para>This document lists errata items for &os; &release.prev;,
containing significant information discovered after the
release or too late in the release cycle to be otherwise
included in the release documentation. This information
includes security advisories, as well as news relating to the
software or documentation that could affect its operation or
usability. An up-to-date version of this document should
always be consulted before installing this version of
&os;.</para>
<para>This errata document for &os; &release.prev; will be
maintained until the release of &os; &release.next;.</para>
</abstract>
</info>
<sect1 xml:id="intro">
<title>Introduction</title>
<para>This errata document contains <quote>late-breaking
news</quote> about &os; &release.prev; Before installing this
version, it is important to consult this document to learn about
any post-release discoveries or problems that may already have
been found and fixed.</para>
<para>Any version of this errata document actually distributed
with the release (for example, on a CDROM distribution) will be
out of date by definition, but other copies are kept updated on
the Internet and should be consulted as the <quote>current
errata</quote> for this release. These other copies of the
errata are located at <link
xlink:href="http://www.FreeBSD.org/releases/" />, plus any
sites which keep up-to-date mirrors of this location.</para>
<para>Source and binary snapshots of &os; &release.branch; also
contain up-to-date copies of this document (as of the time of
the snapshot).</para>
<para>For a list of all &os; CERT security advisories, see <link
xlink:href="http://www.FreeBSD.org/security/"/> or <link
xlink:href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/"/>.</para>
</sect1>
<sect1 xml:id="security">
<title>Security Advisories</title>
<informaltable frame="none" pgwide="0">
<tgroup cols="3">
<colspec colwidth="1*" />
<colspec colwidth="1*" />
<colspec colwidth="3*" />
<thead>
<row>
<entry>Advisory</entry>
<entry>Date</entry>
<entry>Topic</entry>
</row>
</thead>
<tbody>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc"
>SA-13:14.openssh</link></entry>
<entry>19 November 2013</entry>
<entry><para>OpenSSH AES-GCM memory corruption
vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc"
>SA-14:01.bsnmpd</link></entry>
<entry>14 January 2014</entry>
<entry><para>bsnmpd remote denial of service vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc"
>SA-14:02.ntpd</link></entry>
<entry>14 January 2014</entry>
<entry><para>ntpd distributed reflection Denial of Service vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc"
>SA-14:03.openssl</link></entry>
<entry>14 January 2014</entry>
<entry><para>OpenSSL multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc"
>SA-14:04.bind</link></entry>
<entry>14 January 2014</entry>
<entry><para>BIND remote denial of service vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:05.nfsserver.asc"
>SA-14:05.nfsserver</link></entry>
<entry>8 April 2014</entry>
<entry><para>Deadlock in the NFS server</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc"
>SA-14:06.openssl</link></entry>
<entry>8 April 2014</entry>
<entry><para>OpenSSL multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:07.devfs.asc">SA-14:07.devfs</link></entry>
<entry>30 April 2014</entry>
<entry><para>Fix devfs rules not applied by default for
jails</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc">SA-14:08.tcp</link></entry>
<entry>30 April 2014</entry>
<entry><para>Fix TCP reassembly
vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:09.openssl.asc">SA-14:09.openssl</link></entry>
<entry>30 April 2014</entry>
<entry><para>Fix OpenSSL use-after-free
vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:10.openssl.asc">SA-14:10.openssl</link></entry>
<entry>15 May 2014</entry>
<entry><para>Fix OpenSSL NULL pointer deference
vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:11.sendmail.asc">SA-14:11.sendmail</link></entry>
<entry>3 June 2014</entry>
<entry><para>Fix sendmail improper close-on-exec flag
handling</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:13.pam.asc">SA-14:13.pam</link></entry>
<entry>3 June 2014</entry>
<entry><para>Fix incorrect error handling in PAM policy
parser</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc">SA-14:14.openssl</link></entry>
<entry>5 June 2014</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc">SA-14:15.iconv</link></entry>
<entry>24 June 2014</entry>
<entry><para>NULL pointer dereference and out-of-bounds
array access</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:16.file.asc">SA-14:16.file</link></entry>
<entry>24 June 2014</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc">SA-14:17.kmem</link></entry>
<entry>8 July 2014</entry>
<entry><para>Kernel memory disclosure in control messages
and SCTP notifications</para></entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect1>
<sect1 xml:id="open-issues">
<title>Open Issues</title>
<itemizedlist>
<listitem>
<para>&os;/&arch.i386; &release.prev; running as a guest
operating system on <application>VirtualBox</application>
can have a problem with disk I/O access. It depends on some
specific hardware configuration and does not depend on a
specific version of <application>VirtualBox</application> or
host operating system.</para>
<para>It causes various errors and makes &os; quite unstable.
Although the cause is still unclear, disabling unmapped I/O
works as a workaround. To disable it, choose
<literal>Escape to loader prompt</literal> in the boot menu
and enter the following lines from &man.loader.8; prompt,
after an <literal>OK</literal>:</para>
<screen>set vfs.unmapped_buf_allowed=0
boot</screen>
<para>Note that the following line has to be added to
<filename>/boot/loader.conf</filename> after a boot. It
disables unmapped I/O at every boot:</para>
<programlisting>vfs.unmapped_buf_allowed=0</programlisting>
<para>[2014-04-03 update] It has been reported that
instability may be present on virtual machines running
on other hypervisors, such as Xen or KVM.</para>
</listitem>
<listitem>
<para>A bug in <application>Heimdal</application> (an
implementation of <application>Kerberos</application>
authentication in &os; base system) has been fixed. It
could cause an interoperability issue between
<application>Heimdal</application> and the other
implementations including <application>MIT
Kerberos</application>. However, due to this fix,
<application>Heimdal</application> and some applications
which depend on it in the previous &os; releases do not work
with one in &release.prev; in certain cases. Errata Notice
for the supported releases to fix it will be
released.</para>
</listitem>
<listitem>
<para>A bug in &man.killall.1; has been discovered. It
makes <userinput>killall -INT</userinput> to deliver
<literal>SIGTERM</literal> rather than the desired
<literal>SIGINT</literal>, and may cause blocking
behavior for scripts that uses it, as <literal>-I</literal>
means <quote>interactive</quote>. A workaround of this
would be to use <literal>-SIGINT</literal> instead.
This bug has been fixed on &os;-CURRENT and will be fixed
in &os; &release.current;.</para>
</listitem>
<listitem>
<para>The &man.bxe.4; driver can cause packet corruption when
TSO (TCP Segmentation Offload) feature is enabled. This
feature is enabled by default and can be disabled by using a
<option>-tso</option> parameter of &man.ifconfig.8;. It can
be specified in &man.rc.conf.5; like the following:</para>
<programlisting>ifconfig_bxe0="DHCP -tso"</programlisting>
<para>This bug has been fixed on &os;
&release.current;.</para>
</listitem>
<listitem>
<para>Due to a minor incompatibility with &man.pkg.7; version
<literal>1.2.x</literal>, &man.bsdconfig.8; will duplicate
the list of available packages for installation. This is
due to the <literal>PACKAGESITE</literal> environment
variable being set for backwards compatibility with older
versions of &man.pkg.7;. This affects generation of the
available package list only, and does not affect the
behavior when processing packages for installation.</para>
</listitem>
<listitem>
<para>A regression in &man.pw.8; does not remove a user from
groups not specified in the provided group list when the
<literal>-G</literal> flag is used. This is expected to be
corrected in &os;-CURRENT and &os; &release.current;.</para>
</listitem>
<listitem>
<para>&man.ipfw.8; <literal>fwd</literal> action can send
packets to the correct interface with a wrong link-layer
address when the route is updated. This bug has been fixed
on &os;-CURRENT and will be fixed in &os;
&release.current;.</para>
</listitem>
<listitem>
<para>The &man.mount.udf.8; utility has a bug which prevents
it from mounting any UDF file system. This has been fixed
in &os;-CURRENT and &os; &release.current;.</para>
</listitem>
<listitem>
<para>Updating LSI firmware on &man.mps.4; controllers with
the <application>sas2flash</application> utility may cause
the system to hang, or may cause the system to panic. This
is fixed in the <literal>stable/10</literal> branch with
revisions <literal>r262553</literal> and
<literal>r262575</literal>, and will be included in
&os; 10.1-RELEASE.</para>
</listitem>
</itemizedlist>
</sect1>
<sect1 xml:id="late-news">
<title>Late-Breaking News</title>
<para>No news.</para>
</sect1>
</article>
|