From 43ae531ad14fe9237f568cc36cc1478e584752db Mon Sep 17 00:00:00 2001 From: Glen Barber Date: Wed, 27 Aug 2014 00:08:32 +0000 Subject: [PATCH] Regen after r270686 Approved by: re (implicit) Sponsored by: The FreeBSD Foundation --- .../htdocs/releases/10.0R/errata.html | 60 +++++++++---------- 1 file changed, 29 insertions(+), 31 deletions(-) diff --git a/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html b/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html index 3c1dd79d5b..45f48fdd20 100644 --- a/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html +++ b/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html @@ -1,5 +1,6 @@ -FreeBSD 10.0-RELEASE Errata

FreeBSD 10.0-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of +FreeBSD 10.0-RELEASE Errata

FreeBSD 10.0-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United @@ -12,32 +13,28 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2014-08-26 by gjb.
Abstract

This document lists errata items for FreeBSD 10.0-RELEASE, - containing significant information discovered after the release - or too late in the release cycle to be otherwise included in the - release documentation. - This information includes security advisories, as well as news - relating to the software or documentation that could affect its - operation or usability. An up-to-date version of this document - should always be consulted before installing this version of - FreeBSD.

This errata document for FreeBSD 10.0-RELEASE - will be maintained until the release of FreeBSD 10.1-RELEASE.


1. Introduction

This errata document contains late-breaking news - about FreeBSD 10.0-RELEASE - Before installing this version, it is important to consult this - document to learn about any post-release discoveries or problems - that may already have been found and fixed.

Any version of this errata document actually distributed + ® symbol.

Last modified on 2014-08-27 by gjb.
Abstract

This document lists errata items for FreeBSD 10.0-RELEASE, + containing significant information discovered after the + release or too late in the release cycle to be otherwise + included in the release documentation. This information + includes security advisories, as well as news relating to the + software or documentation that could affect its operation or + usability. An up-to-date version of this document should + always be consulted before installing this version of + FreeBSD.

This errata document for FreeBSD 10.0-RELEASE will be + maintained until the release of FreeBSD 10.1-RELEASE.


1. Introduction

This errata document contains late-breaking + news about FreeBSD 10.0-RELEASE Before installing this + version, it is important to consult this document to learn about + any post-release discoveries or problems that may already have + been found and fixed.

Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the current - errata for this release. These other copies of the - errata are located at - http://www.FreeBSD.org/releases/, - plus any sites - which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 10.0-STABLE also + errata” for this release. These other copies of the + errata are located at http://www.FreeBSD.org/releases/, plus any + sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 10.0-STABLE also contain up-to-date copies of this document (as of the time of - the snapshot).

For a list of all FreeBSD CERT security advisories, see - http://www.FreeBSD.org/security/ - or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2. Security Advisories

AdvisoryDateTopic
SA-13:14.openssh19 November 2013

OpenSSH AES-GCM memory corruption + the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2. Security Advisories

AdvisoryDateTopic
SA-13:14.openssh19 November 2013

OpenSSH AES-GCM memory corruption vulnerability

SA-14:01.bsnmpd14 January 2014

bsnmpd remote denial of service vulnerability

SA-14:02.ntpd14 January 2014

ntpd distributed reflection Denial of Service vulnerability

SA-14:03.openssl14 January 2014

OpenSSL multiple vulnerabilities

SA-14:04.bind14 January 2014

BIND remote denial of service vulnerability

SA-14:05.nfsserver8 April 2014

Deadlock in the NFS server

SA-14:06.openssl8 April 2014

OpenSSL multiple vulnerabilities

SA-14:07.devfs30 April 2014

Fix devfs rules not applied by default for jails

SA-14:08.tcp30 April 2014

Fix TCP reassembly vulnerability

SA-14:09.openssl30 April 2014

Fix OpenSSL use-after-free @@ -53,13 +50,13 @@ specific version of VirtualBox or host operating system.

It causes various errors and makes FreeBSD quite unstable. Although the cause is still unclear, disabling unmapped I/O - works as a workaround. To disable it, choose Escape to - loader prompt in the boot menu and enter the following - lines from loader(8) prompt, after - an OK:

set vfs.unmapped_buf_allowed=0
+	  works as a workaround.  To disable it, choose
+	  Escape to loader prompt in the boot menu
+	  and enter the following lines from loader(8) prompt,
+	  after an OK: 

set vfs.unmapped_buf_allowed=0
 boot

Note that the following line has to be added to - /boot/loader.conf after a boot. - It disables unmapped I/O at every boot:

vfs.unmapped_buf_allowed=0

[2014-04-03 update] It has been reported that + /boot/loader.conf after a boot. It + disables unmapped I/O at every boot:

vfs.unmapped_buf_allowed=0

[2014-04-03 update] It has been reported that instability may be present on virtual machines running on other hypervisors, such as Xen or KVM.

  • A bug in Heimdal (an implementation of Kerberos @@ -84,7 +81,8 @@ boot

  • Note that the foll TSO (TCP Segmentation Offload) feature is enabled. This feature is enabled by default and can be disabled by using a -tso parameter of ifconfig(8). It can - be specified in rc.conf(5) like the following:

    ifconfig_bxe0="DHCP -tso"

    This bug has been fixed on FreeBSD 10.0-STABLE.

  • Due to a minor incompatibility with pkg(7) version + be specified in rc.conf(5) like the following:

    ifconfig_bxe0="DHCP -tso"

    This bug has been fixed on FreeBSD + 10.0-STABLE.

  • Due to a minor incompatibility with pkg(7) version 1.2.x, bsdconfig(8) will duplicate the list of available packages for installation. This is due to the PACKAGESITE environment @@ -100,7 +98,7 @@ boot

    Note that the foll on FreeBSD-CURRENT and will be fixed in FreeBSD 10.0-STABLE.

  • The mount_udf(8) utility has a bug which prevents it from mounting any UDF file system. This has been fixed - in FreeBSD-CURRENT and FreeBSD 10.0-STABLE.

  • Updating LSI firmware on mps(4) controllers with + in FreeBSD-CURRENT and FreeBSD 10.0-STABLE.

  • Updating LSI firmware on mps(4) controllers with the sas2flash utility may cause the system to hang, or may cause the system to panic. This is fixed in the stable/10 branch with