1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
|
<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook XML V5.0-Based Extension//EN"
"http://www.FreeBSD.org/XML/share/xml/freebsd50.dtd" [
<!ENTITY % release PUBLIC "-//FreeBSD//ENTITIES Release Specification//EN"
"http://www.FreeBSD.org/release/XML/release.ent">
%release;
]>
<article xmlns="http://docbook.org/ns/docbook"
xmlns:xlink="http://www.w3.org/1999/xlink"
version="5.0">
<info>
<title>&os; &release.prev; Errata </title>
<author><orgname>The &os; Project</orgname></author>
<pubdate>$FreeBSD$</pubdate>
<copyright>
<year>2014</year>
<holder role="mailto:doc@FreeBSD.org">The &os; Documentation Project</holder>
</copyright>
<legalnotice xml:id="trademarks" role="trademarks">
&tm-attrib.freebsd;
&tm-attrib.intel;
&tm-attrib.sparc;
&tm-attrib.general;
</legalnotice>
<abstract>
<para>This document lists errata items for &os; &release.prev;,
containing significant information discovered after the release
or too late in the release cycle to be otherwise included in the
release documentation.
This information includes security advisories, as well as news
relating to the software or documentation that could affect its
operation or usability. An up-to-date version of this document
should always be consulted before installing this version of
&os;.</para>
<para>This errata document for &os; &release.prev;
will be maintained until the release of &os; &release.next;.</para>
</abstract>
</info>
<sect1 xml:id="intro">
<title>Introduction</title>
<para>This errata document contains <quote>late-breaking news</quote>
about &os; &release.prev;
Before installing this version, it is important to consult this
document to learn about any post-release discoveries or problems
that may already have been found and fixed.</para>
<para>Any version of this errata document actually distributed
with the release (for example, on a CDROM distribution) will be
out of date by definition, but other copies are kept updated on
the Internet and should be consulted as the <quote>current
errata</quote> for this release. These other copies of the
errata are located at
<link xlink:href="http://www.FreeBSD.org/releases/" />,
plus any sites
which keep up-to-date mirrors of this location.</para>
<para>Source and binary snapshots of &os; &release.branch; also
contain up-to-date copies of this document (as of the time of
the snapshot).</para>
<para>For a list of all &os; CERT security advisories, see
<link xlink:href="http://www.FreeBSD.org/security/" />
or <link xlink:href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/" />.</para>
</sect1>
<sect1 xml:id="security">
<title>Security Advisories</title>
<informaltable frame="none" pgwide="0">
<tgroup cols="3">
<colspec colwidth="1*" />
<colspec colwidth="1*" />
<colspec colwidth="3*" />
<thead>
<row>
<entry>Advisory</entry>
<entry>Date</entry>
<entry>Topic</entry>
</row>
</thead>
<tbody>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc"
>SA-13:14.openssh</link></entry>
<entry>19 November 2013</entry>
<entry><para>OpenSSH AES-GCM memory corruption
vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc"
>SA-14:01.bsnmpd</link></entry>
<entry>14 January 2014</entry>
<entry><para>bsnmpd remote denial of service vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc"
>SA-14:02.ntpd</link></entry>
<entry>14 January 2014</entry>
<entry><para>ntpd distributed reflection Denial of Service vulnerability</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc"
>SA-14:03.openssl</link></entry>
<entry>14 January 2014</entry>
<entry><para>OpenSSL multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc"
>SA-14:04.bind</link></entry>
<entry>14 January 2014</entry>
<entry><para>BIND remote denial of service vulnerability</para></entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect1>
<sect1 xml:id="open-issues">
<title>Open Issues</title>
<itemizedlist>
<listitem>
<para>&os;/&arch.i386; &release.prev; running as a guest
operating system on <application>VirtualBox</application>
can have a problem with disk I/O access. It depends on some
specific hardware configuration and does not depend on a
specific version of <application>VirtualBox</application> or
host operating system.</para>
<para>It causes various errors and makes &os; quite unstable.
Although the cause is still unclear, disabling unmapped I/O
works as a workaround. To disable it, choose <literal>Escape to
loader prompt</literal> in the boot menu and enter the following
lines from &man.loader.8; prompt, after
an <literal>OK</literal>:</para>
<screen>set vfs.unmapped_buf_allowed=0
boot</screen>
<para>Note that the following line has to be added to
<filename>/boot/loader.conf</filename> after a boot.
It disables unmapped I/O at every boot:</para>
<programlisting>vfs.unmapped_buf_allowed=0</programlisting>
<para>[2014-04-03 update] It has been reported that
instability may be present on virtual machines running
on other hypervisors, such as Xen or KVM.</para>
</listitem>
<listitem>
<para>A bug in <application>Heimdal</application> (an
implementation of <application>Kerberos</application>
authentication in &os; base system) has been fixed. It
could cause an interoperability issue between
<application>Heimdal</application> and the other
implementations including <application>MIT
Kerberos</application>. However, due to this fix,
<application>Heimdal</application> and some applications
which depend on it in the previous &os; releases do not work
with one in &release.prev; in certain cases. Errata Notice
for the supported releases to fix it will be
released.</para>
</listitem>
<listitem>
<para>A bug in &man.killall.1; has been discovered. It
makes <userinput>killall -INT</userinput> to deliver
<literal>SIGTERM</literal> rather than the desired
<literal>SIGINT</literal>, and may cause blocking
behavior for scripts that uses it, as <literal>-I</literal>
means <quote>interactive</quote>. A workaround of this
would be to use <literal>-SIGINT</literal> instead.
This bug has been fixed on &os;-CURRENT and will be fixed
in &os; &release.current;.</para>
</listitem>
<listitem>
<para>The &man.bxe.4; driver can cause packet corruption when
TSO (TCP Segmentation Offload) feature is enabled. This
feature is enabled by default and can be disabled by using a
<option>-tso</option> parameter of &man.ifconfig.8;. It can
be specified in &man.rc.conf.5; like the following:</para>
<programlisting>ifconfig_bxe0="DHCP -tso"</programlisting>
<para>This bug has been fixed on &os; &release.current;.</para>
</listitem>
<listitem>
<para>Due to a minor incompatibility with &man.pkg.7; version
<literal>1.2.x</literal>, &man.bsdconfig.8; will duplicate
the list of available packages for installation. This is
due to the <literal>PACKAGESITE</literal> environment
variable being set for backwards compatibility with older
versions of &man.pkg.7;. This affects generation of the
available package list only, and does not affect the
behavior when processing packages for installation.</para>
</listitem>
<listitem>
<para>A regression in &man.pw.8; does not remove a user from
groups not specified in the provided group list when the
<literal>-G</literal> flag is used. This is expected to be
corrected in &os;-CURRENT and &os; &release.current;.</para>
</listitem>
<listitem>
<para>&man.ipfw.8; <literal>fwd</literal> action can send
packets to the correct interface with a wrong link-layer
address when the route is updated. This bug has been fixed
on &os;-CURRENT and will be fixed in &os;
&release.current;.</para>
</listitem>
<listitem>
<para>The &man.mount.udf.8; utility has a bug which prevents
it from mounting any UDF file system. This has been fixed
in &os;-CURRENT and &os; &release.current;.</para>
</listitem>
<listitem>
<para>Updating LSI firmware on &man.mps.4; controllers with
the <application>sas2flash</application> utility may cause
the system to hang, or may cause the sytem to panic. This
is fixed in the <literal>stable/10</literal> branch with
revisions <literal>r262553</literal> and
<literal>r262575</literal>, and will be included in
&os; 10.1-RELEASE.</para>
</listitem>
</itemizedlist>
</sect1>
<sect1 xml:id="late-news">
<title>Late-Breaking News</title>
<para>No news.</para>
</sect1>
</article>
|