summaryrefslogtreecommitdiffstats
path: root/release/doc/en_US.ISO8859-1/errata/article.xml
blob: 894df4b129f9f59e5b19e811fdbf61af0bb7ddd0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook XML V5.0-Based Extension//EN"
        "http://www.FreeBSD.org/XML/share/xml/freebsd50.dtd" [
<!ENTITY % release PUBLIC "-//FreeBSD//ENTITIES Release Specification//EN"
        "http://www.FreeBSD.org/release/XML/release.ent">
%release;
]>

<article xmlns="http://docbook.org/ns/docbook"
	 xmlns:xlink="http://www.w3.org/1999/xlink"
	 version="5.0">
  <info>
    <title>&os; &release.prev; Errata </title>

    <author><orgname>The &os; Project</orgname></author>

    <pubdate>$FreeBSD$</pubdate>

    <copyright>
      <year>2014</year>

      <holder role="mailto:doc@FreeBSD.org">The &os; Documentation Project</holder>
    </copyright>

    <legalnotice xml:id="trademarks" role="trademarks">
      &tm-attrib.freebsd;
      &tm-attrib.intel;
      &tm-attrib.sparc;
      &tm-attrib.general;
    </legalnotice>

    <abstract>
      <para>This document lists errata items for &os; &release.prev;,
	containing significant information discovered after the release
	or too late in the release cycle to be otherwise included in the
	release documentation.
	This information includes security advisories, as well as news
	relating to the software or documentation that could affect its
	operation or usability.  An up-to-date version of this document
	should always be consulted before installing this version of
	&os;.</para>

      <para>This errata document for &os; &release.prev;
	will be maintained until the release of &os; &release.next;.</para>
    </abstract>
  </info>

  <sect1 xml:id="intro">
    <title>Introduction</title>

    <para>This errata document contains <quote>late-breaking news</quote>
      about &os; &release.prev;
      Before installing this version, it is important to consult this
      document to learn about any post-release discoveries or problems
      that may already have been found and fixed.</para>

    <para>Any version of this errata document actually distributed
      with the release (for example, on a CDROM distribution) will be
      out of date by definition, but other copies are kept updated on
      the Internet and should be consulted as the <quote>current
      errata</quote> for this release.  These other copies of the
      errata are located at
      <link xlink:href="http://www.FreeBSD.org/releases/" />,
      plus any sites
      which keep up-to-date mirrors of this location.</para>

    <para>Source and binary snapshots of &os; &release.branch; also
      contain up-to-date copies of this document (as of the time of
      the snapshot).</para>

    <para>For a list of all &os; CERT security advisories, see
      <link xlink:href="http://www.FreeBSD.org/security/" />
      or <link xlink:href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/" />.</para>
  </sect1>

  <sect1 xml:id="security">
    <title>Security Advisories</title>

    <informaltable frame="none" pgwide="0">
      <tgroup cols="3">
	<colspec colwidth="1*" />
	<colspec colwidth="1*" />
	<colspec colwidth="3*" />
	<thead>
	  <row>
	    <entry>Advisory</entry>
	    <entry>Date</entry>
	    <entry>Topic</entry>
	  </row>
	</thead>

	<tbody>
	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc"
	      >SA-13:14.openssh</link></entry>

	    <entry>19&nbsp;November&nbsp;2013</entry>

	    <entry><para>OpenSSH AES-GCM memory corruption
		vulnerability</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc"
	      >SA-14:01.bsnmpd</link></entry>

	    <entry>14&nbsp;January&nbsp;2014</entry>

	    <entry><para>bsnmpd remote denial of service vulnerability</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc"
	      >SA-14:02.ntpd</link></entry>

	    <entry>14&nbsp;January&nbsp;2014</entry>

	    <entry><para>ntpd distributed reflection Denial of Service vulnerability</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc"
	      >SA-14:03.openssl</link></entry>

	    <entry>14&nbsp;January&nbsp;2014</entry>

	    <entry><para>OpenSSL multiple vulnerabilities</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc"
	      >SA-14:04.bind</link></entry>

	    <entry>14&nbsp;January&nbsp;2014</entry>

	    <entry><para>BIND remote denial of service vulnerability</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:05.nfsserver.asc"
	      >SA-14:05.nfsserver</link></entry>

	    <entry>8&nbsp;April&nbsp;2014</entry>

	    <entry><para>Deadlock in the NFS server</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc"
	      >SA-14:06.openssl</link></entry>

	    <entry>8&nbsp;April&nbsp;2014</entry>

	    <entry><para>OpenSSL multiple vulnerabilities</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:07.devfs.asc">SA-14:07.devfs</link></entry>
	    <entry>30&nbsp;April&nbsp;2014</entry>
	    <entry><para>Fix devfs rules not applied by default for
		jails</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc">SA-14:08.tcp</link></entry>
	    <entry>30&nbsp;April&nbsp;2014</entry>
	    <entry><para>Fix TCP reassembly
		vulnerability</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:09.openssl.asc">SA-14:09.openssl</link></entry>
	    <entry>30&nbsp;April&nbsp;2014</entry>
	    <entry><para>Fix OpenSSL use-after-free
		vulnerability</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:10.openssl.asc">SA-14:10.openssl</link></entry>
	    <entry>15&nbsp;May&nbsp;2014</entry>
	    <entry><para>Fix OpenSSL NULL pointer deference
		vulnerability</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:11.sendmail.asc">SA-14:11.sendmail</link></entry>
	    <entry>3&nbsp;June&nbsp;2014</entry>
	    <entry><para>Fix sendmail improper close-on-exec flag
		handling</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:13.pam.asc">SA-14:13.pam</link></entry>
	    <entry>3&nbsp;June&nbsp;2014</entry>
	    <entry><para>Fix incorrect error handling in PAM policy
		parser</para></entry>
	  </row>

	  <row>
	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc">SA-14:14.openssl</link></entry>
	    <entry>5&nbsp;June&nbsp;2014</entry>
	    <entry><para>Multiple vulnerabilities</para></entry>
	  </row>
	</tbody>
      </tgroup>
    </informaltable>
  </sect1>

  <sect1 xml:id="open-issues">
    <title>Open Issues</title>

    <itemizedlist>
      <listitem>
	<para>&os;/&arch.i386; &release.prev; running as a guest
	  operating system on <application>VirtualBox</application>
	  can have a problem with disk I/O access.  It depends on some
	  specific hardware configuration and does not depend on a
	  specific version of <application>VirtualBox</application> or
	  host operating system.</para>

	<para>It causes various errors and makes &os; quite unstable.
	  Although the cause is still unclear, disabling unmapped I/O
	  works as a workaround.  To disable it, choose <literal>Escape to
	    loader prompt</literal> in the boot menu and enter the following
	  lines from &man.loader.8; prompt, after
	  an <literal>OK</literal>:</para>

	<screen>set vfs.unmapped_buf_allowed=0
boot</screen>

	<para>Note that the following line has to be added to
	  <filename>/boot/loader.conf</filename> after a boot.
          It disables unmapped I/O at every boot:</para>

	<programlisting>vfs.unmapped_buf_allowed=0</programlisting>

	<para>[2014-04-03 update]  It has been reported that
	  instability may be present on virtual machines running
	  on other hypervisors, such as Xen or KVM.</para>
      </listitem>

      <listitem>
	<para>A bug in <application>Heimdal</application> (an
	  implementation of <application>Kerberos</application>
	  authentication in &os; base system) has been fixed.  It
	  could cause an interoperability issue between
	  <application>Heimdal</application> and the other
	  implementations including <application>MIT
	  Kerberos</application>.  However, due to this fix,
	  <application>Heimdal</application> and some applications
	  which depend on it in the previous &os; releases do not work
	  with one in &release.prev; in certain cases.  Errata Notice
	  for the supported releases to fix it will be
	  released.</para>
      </listitem>

      <listitem>
	<para>A bug in &man.killall.1; has been discovered.  It
	  makes <userinput>killall -INT</userinput> to deliver
	  <literal>SIGTERM</literal> rather than the desired
	  <literal>SIGINT</literal>, and may cause blocking
	  behavior for scripts that uses it, as <literal>-I</literal>
	  means <quote>interactive</quote>.  A workaround of this
	  would be to use <literal>-SIGINT</literal> instead.
	  This bug has been fixed on &os;-CURRENT and will be fixed
	  in &os; &release.current;.</para>
      </listitem>

      <listitem>
	<para>The &man.bxe.4; driver can cause packet corruption when
	  TSO (TCP Segmentation Offload) feature is enabled.  This
	  feature is enabled by default and can be disabled by using a
	  <option>-tso</option> parameter of &man.ifconfig.8;.  It can
	  be specified in &man.rc.conf.5; like the following:</para>

	<programlisting>ifconfig_bxe0="DHCP -tso"</programlisting>

	<para>This bug has been fixed on &os; &release.current;.</para>
      </listitem>

      <listitem>
	<para>Due to a minor incompatibility with &man.pkg.7; version
	  <literal>1.2.x</literal>, &man.bsdconfig.8; will duplicate
	  the list of available packages for installation.  This is
	  due to the <literal>PACKAGESITE</literal> environment
	  variable being set for backwards compatibility with older
	  versions of &man.pkg.7;.  This affects generation of the
	  available package list only, and does not affect the
	  behavior when processing packages for installation.</para>
      </listitem>

      <listitem>
	<para>A regression in &man.pw.8; does not remove a user from
	  groups not specified in the provided group list when the
	  <literal>-G</literal> flag is used.  This is expected to be
	  corrected in &os;-CURRENT and &os; &release.current;.</para>
      </listitem>

      <listitem>
	<para>&man.ipfw.8; <literal>fwd</literal> action can send
	  packets to the correct interface with a wrong link-layer
	  address when the route is updated.  This bug has been fixed
	  on &os;-CURRENT and will be fixed in &os;
	  &release.current;.</para>
      </listitem>

      <listitem>
	<para>The &man.mount.udf.8; utility has a bug which prevents
	  it from mounting any UDF file system.  This has been fixed
  	  in &os;-CURRENT and &os; &release.current;.</para>
      </listitem>

      <listitem>
	<para>Updating LSI firmware on &man.mps.4; controllers with
	  the <application>sas2flash</application> utility may cause
	  the system to hang, or may cause the sytem to panic.  This
	  is fixed in the <literal>stable/10</literal> branch with
	  revisions <literal>r262553</literal> and
	  <literal>r262575</literal>, and will be included in
	  &os;&nbsp;10.1-RELEASE.</para>
      </listitem>
    </itemizedlist>
  </sect1>

  <sect1 xml:id="late-news">
    <title>Late-Breaking News</title>

    <para>No news.</para>
  </sect1>
</article>
OpenPOWER on IntegriCloud