doc/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html
Glen Barber 029c1a9a65 Regen after r271687
Approved by:	re (implicit)
Sponsored by:	The FreeBSD Foundation
2014-09-16 19:29:22 +00:00

114 lines
No EOL
21 KiB
HTML
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 10.0-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc@FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 10.0-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 10.0-RELEASE will be maintained until the release of FreeBSD 10.1-RELEASE." /></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp61540512"></a>FreeBSD 10.0-RELEASE Errata </h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">The FreeBSD Project</span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2014 The FreeBSD Documentation
Project</p></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="legalnotice"><a id="trademarks"></a><p xmlns="http://www.w3.org/TR/xhtml1/transitional">FreeBSD is a registered trademark of
the FreeBSD Foundation. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Intel, Celeron, EtherExpress, i386,
i486, Itanium, Pentium, and Xeon are trademarks or registered
trademarks of Intel Corporation or its subsidiaries in the United
States and other countries. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SPARC, SPARC64, and
UltraSPARC are trademarks of SPARC International, Inc in the United
States and other countries. SPARC International, Inc owns all of the
SPARC trademarks and under licensing agreements allows the proper use
of these trademarks by its members. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Many of the designations used by
manufacturers and sellers to distinguish their products are claimed
as trademarks. Where those designations appear in this document,
and the FreeBSD Project was aware of the trademark claim, the
designations have been followed by the <span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">&#8482;</span>&#8221;</span> or the
<span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">®</span>&#8221;</span> symbol. </p></div></div><div>Last modified on 2014-09-16 by gjb.</div><div><div xmlns="http://www.w3.org/1999/xhtml" class="abstract"><div class="abstract-title">Abstract</div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">This document lists errata items for FreeBSD 10.0-RELEASE,
containing significant information discovered after the
release or too late in the release cycle to be otherwise
included in the release documentation. This information
includes security advisories, as well as news relating to the
software or documentation that could affect its operation or
usability. An up-to-date version of this document should
always be consulted before installing this version of
FreeBSD. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">This errata document for FreeBSD 10.0-RELEASE will be
maintained until the release of FreeBSD 10.1-RELEASE. </p></div></div></div><hr /></div><div class="toc"><div class="toc-title">Table of Contents</div><dl class="toc"><dt><span class="sect1"><a href="#intro">1. Introduction</a></span></dt><dt><span class="sect1"><a href="#security">2. Security Advisories</a></span></dt><dt><span class="sect1"><a href="#open-issues">3. Open Issues</a></span></dt><dt><span class="sect1"><a href="#late-news">4. Late-Breaking News</a></span></dt></dl></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="intro"></a>1. Introduction</h2></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">This errata document contains <span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">late-breaking
news</span>&#8221;</span> about FreeBSD 10.0-RELEASE Before installing this
version, it is important to consult this document to learn about
any post-release discoveries or problems that may already have
been found and fixed. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Any version of this errata document actually distributed
with the release (for example, on a CDROM distribution) will be
out of date by definition, but other copies are kept updated on
the Internet and should be consulted as the <span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">current
errata</span>&#8221;</span> for this release. These other copies of the
errata are located at <a xmlns="http://www.w3.org/1999/xhtml" class="link" href="http://www.FreeBSD.org/releases/" target="_top">http://www.FreeBSD.org/releases/</a>, plus any
sites which keep up-to-date mirrors of this location. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Source and binary snapshots of FreeBSD 10.0-STABLE also
contain up-to-date copies of this document (as of the time of
the snapshot). </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">For a list of all FreeBSD CERT security advisories, see <a xmlns="http://www.w3.org/1999/xhtml" class="link" href="http://www.FreeBSD.org/security/" target="_top">http://www.FreeBSD.org/security/</a> or <a xmlns="http://www.w3.org/1999/xhtml" class="link" href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/" target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a>. </p></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="security"></a>2. Security Advisories</h2></div></div></div><div class="informaltable"><table border="0"><colgroup><col /><col /><col /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc" target="_top">SA-13:14.openssh</a></td><td>19 November 2013</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">OpenSSH AES-GCM memory corruption
vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc" target="_top">SA-14:01.bsnmpd</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">bsnmpd remote denial of service vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" target="_top">SA-14:02.ntpd</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">ntpd distributed reflection Denial of Service vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc" target="_top">SA-14:03.openssl</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">OpenSSL multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc" target="_top">SA-14:04.bind</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">BIND remote denial of service vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:05.nfsserver.asc" target="_top">SA-14:05.nfsserver</a></td><td>8 April 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Deadlock in the NFS server </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc" target="_top">SA-14:06.openssl</a></td><td>8 April 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">OpenSSL multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:07.devfs.asc" target="_top">SA-14:07.devfs</a></td><td>30 April 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix devfs rules not applied by default for
jails </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc" target="_top">SA-14:08.tcp</a></td><td>30 April 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix TCP reassembly
vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:09.openssl.asc" target="_top">SA-14:09.openssl</a></td><td>30 April 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix OpenSSL use-after-free
vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:10.openssl.asc" target="_top">SA-14:10.openssl</a></td><td>15 May 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix OpenSSL NULL pointer deference
vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:11.sendmail.asc" target="_top">SA-14:11.sendmail</a></td><td>3 June 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix sendmail improper close-on-exec flag
handling </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:13.pam.asc" target="_top">SA-14:13.pam</a></td><td>3 June 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix incorrect error handling in PAM policy
parser </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc" target="_top">SA-14:14.openssl</a></td><td>5 June 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc" target="_top">SA-14:15.iconv</a></td><td>24 June 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">NULL pointer dereference and out-of-bounds
array access </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:16.file.asc" target="_top">SA-14:16.file</a></td><td>24 June 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc" target="_top">SA-14:17.kmem</a></td><td>8 July 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Kernel memory disclosure in control messages
and SCTP notifications </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc" target="_top">SA-14:18.openssl</a></td><td>9 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc" target="_top">SA-14:19.tcp</a></td><td>16 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Denial of Service in TCP packet
processing. </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="open-issues"></a>3. Open Issues</h2></div></div></div><div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional">FreeBSD/i386 10.0-RELEASE running as a guest
operating system on <span xmlns="http://www.w3.org/1999/xhtml" class="application">VirtualBox</span>
can have a problem with disk I/O access. It depends on some
specific hardware configuration and does not depend on a
specific version of <span xmlns="http://www.w3.org/1999/xhtml" class="application">VirtualBox</span> or
host operating system. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">It causes various errors and makes FreeBSD quite unstable.
Although the cause is still unclear, disabling unmapped I/O
works as a workaround. To disable it, choose
<code xmlns="http://www.w3.org/1999/xhtml" class="literal">Escape to loader prompt</code> in the boot menu
and enter the following lines from <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=loader&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">loader</span>(8)</span></a> prompt,
after an <code xmlns="http://www.w3.org/1999/xhtml" class="literal">OK</code>: </p><pre class="screen">set vfs.unmapped_buf_allowed=0
boot</pre><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Note that the following line has to be added to
<code xmlns="http://www.w3.org/1999/xhtml" class="filename">/boot/loader.conf</code> after a boot. It
disables unmapped I/O at every boot: </p><pre class="programlisting">vfs.unmapped_buf_allowed=0</pre><p xmlns="http://www.w3.org/TR/xhtml1/transitional">[2014-04-03 update] It has been reported that
instability may be present on virtual machines running
on other hypervisors, such as Xen or KVM. </p></li><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional">A bug in <span xmlns="http://www.w3.org/1999/xhtml" class="application">Heimdal</span> (an
implementation of <span xmlns="http://www.w3.org/1999/xhtml" class="application">Kerberos</span>
authentication in FreeBSD base system) has been fixed. It
could cause an interoperability issue between
<span xmlns="http://www.w3.org/1999/xhtml" class="application">Heimdal</span> and the other
implementations including <span xmlns="http://www.w3.org/1999/xhtml" class="application">MIT
Kerberos</span>. However, due to this fix,
<span xmlns="http://www.w3.org/1999/xhtml" class="application">Heimdal</span> and some applications
which depend on it in the previous FreeBSD releases do not work
with one in 10.0-RELEASE in certain cases. Errata Notice
for the supported releases to fix it will be
released. </p></li><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional">A bug in <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=killall&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">killall</span>(1)</span></a> has been discovered. It
makes <strong xmlns="http://www.w3.org/1999/xhtml" class="userinput"><code>killall -INT</code></strong> to deliver
<code xmlns="http://www.w3.org/1999/xhtml" class="literal">SIGTERM</code> rather than the desired
<code xmlns="http://www.w3.org/1999/xhtml" class="literal">SIGINT</code>, and may cause blocking
behavior for scripts that uses it, as <code xmlns="http://www.w3.org/1999/xhtml" class="literal">-I</code>
means <span xmlns="http://www.w3.org/1999/xhtml" class="quote">&#8220;<span class="quote">interactive</span>&#8221;</span>. A workaround of this
would be to use <code xmlns="http://www.w3.org/1999/xhtml" class="literal">-SIGINT</code> instead.
This bug has been fixed on FreeBSD-CURRENT and will be fixed
in FreeBSD 10.0-STABLE. </p></li><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional">The <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=bxe&amp;sektion=4"><span class="citerefentry"><span class="refentrytitle">bxe</span>(4)</span></a> driver can cause packet corruption when
TSO (TCP Segmentation Offload) feature is enabled. This
feature is enabled by default and can be disabled by using a
<code xmlns="http://www.w3.org/1999/xhtml" class="option">-tso</code> parameter of <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=ifconfig&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">ifconfig</span>(8)</span></a>. It can
be specified in <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=rc.conf&amp;sektion=5"><span class="citerefentry"><span class="refentrytitle">rc.conf</span>(5)</span></a> like the following: </p><pre class="programlisting">ifconfig_bxe0="DHCP -tso"</pre><p xmlns="http://www.w3.org/TR/xhtml1/transitional">This bug has been fixed on FreeBSD
10.0-STABLE. </p></li><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Due to a minor incompatibility with <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=pkg&amp;sektion=7"><span class="citerefentry"><span class="refentrytitle">pkg</span>(7)</span></a> version
<code xmlns="http://www.w3.org/1999/xhtml" class="literal">1.2.x</code>, <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=bsdconfig&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">bsdconfig</span>(8)</span></a> will duplicate
the list of available packages for installation. This is
due to the <code xmlns="http://www.w3.org/1999/xhtml" class="literal">PACKAGESITE</code> environment
variable being set for backwards compatibility with older
versions of <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=pkg&amp;sektion=7"><span class="citerefentry"><span class="refentrytitle">pkg</span>(7)</span></a>. This affects generation of the
available package list only, and does not affect the
behavior when processing packages for installation. </p></li><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional">A regression in <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=pw&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">pw</span>(8)</span></a> does not remove a user from
groups not specified in the provided group list when the
<code xmlns="http://www.w3.org/1999/xhtml" class="literal">-G</code> flag is used. This is expected to be
corrected in FreeBSD-CURRENT and FreeBSD 10.0-STABLE. </p></li><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=ipfw&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">ipfw</span>(8)</span></a> <code xmlns="http://www.w3.org/1999/xhtml" class="literal">fwd</code> action can send
packets to the correct interface with a wrong link-layer
address when the route is updated. This bug has been fixed
on FreeBSD-CURRENT and will be fixed in FreeBSD
10.0-STABLE. </p></li><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional">The <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=mount_udf&amp;sektion=8"><span class="citerefentry"><span class="refentrytitle">mount_udf</span>(8)</span></a> utility has a bug which prevents
it from mounting any UDF file system. This has been fixed
in FreeBSD-CURRENT and FreeBSD 10.0-STABLE. </p></li><li class="listitem"><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Updating LSI firmware on <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=mps&amp;sektion=4"><span class="citerefentry"><span class="refentrytitle">mps</span>(4)</span></a> controllers with
the <span xmlns="http://www.w3.org/1999/xhtml" class="application">sas2flash</span> utility may cause
the system to hang, or may cause the system to panic. This
is fixed in the <code xmlns="http://www.w3.org/1999/xhtml" class="literal">stable/10</code> branch with
revisions <code xmlns="http://www.w3.org/1999/xhtml" class="literal">r262553</code> and
<code xmlns="http://www.w3.org/1999/xhtml" class="literal">r262575</code>, and will be included in
FreeBSD 10.1-RELEASE. </p></li></ul></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="late-news"></a>4. Late-Breaking News</h2></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">No news. </p></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>This file, and other release-related documents,
can be downloaded from <a href="http://www.FreeBSD.org/snapshots/">http://www.FreeBSD.org/snapshots/</a>.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>For questions about FreeBSD, read the
<a href="http://www.FreeBSD.org/docs.html">documentation</a> before
contacting &lt;<a href="mailto:questions@FreeBSD.org">questions@FreeBSD.org</a>&gt;.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>All users of FreeBSD 10.0-STABLE should
subscribe to the &lt;<a href="mailto:stable@FreeBSD.org">stable@FreeBSD.org</a>&gt;
mailing list.</small></p><p xmlns="http://www.w3.org/TR/xhtml1/transitional" align="center"><small>For questions about this documentation,
e-mail &lt;<a href="mailto:doc@FreeBSD.org">doc@FreeBSD.org</a>&gt;.</small></p></body></html>