Index: head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html =================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html (revision 50243) +++ head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html (revision 50244) @@ -1,160 +1,160 @@ -
Copyright © 2016 The FreeBSD Documentation +
Copyright © 2016 The FreeBSD Documentation Project
FreeBSD is a registered trademark of the FreeBSD Foundation.
Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use of these trademarks by its members.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the “™” or the - “®” symbol.
This document lists errata items for FreeBSD 10.3-RELEASE, + “®” symbol.
This document lists errata items for FreeBSD 10.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.
This errata document for FreeBSD 10.3-RELEASE will be maintained until the release of FreeBSD 10.3-RELEASE.
This errata document contains “late-breaking news” about FreeBSD 10.3-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.
Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the “current errata” for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.
Source and binary snapshots of FreeBSD 10.3-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).
For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.
Advisory | Date | Topic |
---|---|---|
FreeBSD-SA-16:09.ntp | 29 April 2016 | Multiple ntp vulnerabilities. |
FreeBSD-SA-16:17.openssl | 29 April 2016 | Multiple OpenSSL vulnerabilities. |
FreeBSD-SA-16:18.atkbd | 17 May 2016 | Keyboard driver buffer overflow |
FreeBSD-SA-16:19.sendmsg | 17 May 2016 | Incorrect argument handling in sendmsg(2) |
FreeBSD-SA-16:20.linux | 31 May 2016 | Kernel stack disclosure in Linux compatibility layer |
FreeBSD-SA-16:21.43bsd | 31 May 2016 | Kernel stack disclosure in 4.3BSD compatibility layer |
FreeBSD-SA-16:22.libarchive | 31 May 2016 | Absolute path traversal vulnerability |
FreeBSD-SA-16:23.libarchive | 31 May 2016 | Absolute path traversal vulnerability |
FreeBSD-SA-16:24.ntp | 3 June 2016 | Multiple ntp vulnerabilties |
FreeBSD-SA-16:25.bspatch | 25 July 2016 | heap overflow vulnerability |
FreeBSD-SA-16:26.openssl | 23 September 2016 | Multiple vulnerabilities |
FreeBSD-SA-16:27.openssl | 26 September 2016 | Regression in OpenSSL suite |
FreeBSD-SA-16:29.bspatch | 10 October 2016 | Heap overflow vulnerability |
FreeBSD-SA-16:30.portsnap | 10 October 2016 | Multiple vulnerabilities |
FreeBSD-SA-16:31.libarchive | 10 October 2016 | Multiple vulnerabilities |
FreeBSD-SA-16:33.openssh | 2 November 2016 | Remote Denial of Service vulnerability |
FreeBSD-SA-16:35.openssl | 2 November 2016 | Remote Denial of Service vulnerability |
FreeBSD-SA-16:36.telnetd | 6 December 2016 | Possible login(1) argument injection |
FreeBSD-SA-16:37.libc | 6 December 2016 | link_ntoa(3) buffer overflow |
FreeBSD-SA-16:38.bhyve | 6 December 2016 | Possible escape from bhyve(8) virtual machine |
FreeBSD-SA-16:39.ntp | 22 December 2016 | Multiple vulnerabilities |
FreeBSD-SA-17:01.openssh | 10 January 2017 | Multiple vulnerabilities |
FreeBSD-SA-17:02.openssl | 23 February 2017 | Fix OpenSSL RC4_MD5 cipher - vulnerability |
FreeBSD-SA-17:03.ntp | 12 April 2017 | Multiple vulnerabilities |
Errata | Date | Topic |
---|---|---|
FreeBSD-EN-16:06.libc | 4 May 2016 | Performance regression in libc + vulnerability |
FreeBSD-SA-17:03.ntp | 12 April 2017 | Multiple vulnerabilities |
FreeBSD-SA-17:04.ipfilter | 27 April 2017 | Fix fragment handling panic |
Errata | Date | Topic |
---|---|---|
FreeBSD-EN-16:06.libc | 4 May 2016 | Performance regression in libc hash(3) |
FreeBSD-EN-16:07.ipi | 4 May 2016 | Excessive latency in x86 IPI delivery |
FreeBSD-EN-16:08.zfs | 4 May 2016 | Memory leak in ZFS |
FreeBSD-EN-16:09.freebsd-update | 25 July 2016 | Fix freebsd-update(8) support of FreeBSD 11.0-RELEASE |
FreeBSD-EN-16:10.dhclient | 11 August 2016 | Better handle unknown options received from aDHCP server |
FreeBSD-EN-16:11.vmbus | 11 August 2016 | Avoid using spin locks for channel message locks |
FreeBSD-EN-16:12.hv_storvsc | 11 August 2016 | Enable INQUIRY result check only on Windows 10 host systems |
FreeBSD-EN-16:13.vmbus | 11 August 2016 | Register time counter early enough for TSC freq calibration |
FreeBSD-EN-16:14.hv_storvsc | 11 August 2016 | Disable incorrect callout in hv_storvsc(4) |
FreeBSD-EN-16:15.vmbus | 11 August 2016 | Better handle the GPADL setup failure in Hyper-V |
FreeBSD-EN-16:16.hv_storvsc | 11 August 2016 | Fix SCSI INQUIRY checks and error handling |
FreeBSD-EN-16:17.vm | 25 October 2016 | Several virtual memory issues |
FreeBSD-EN-16:19.tzcode | 6 December 2016 | Fix warnings about invalid timezone abbreviations |
FreeBSD-EN-16:20.tzdata | 6 December 2016 | Update timezone database information |
FreeBSD-EN-17:05.xen | 23 February 2017 | Xen migration enhancements |
FreeBSD/i386 10.3-RELEASE running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a specific version of VirtualBox or host operating system.
It has been reported that instability may be present on virtual machines running on other hypervisors, such as Xen or KVM.
It causes various errors and makes FreeBSD quite unstable.
Although the cause is still unclear, disabling unmapped I/O
works as a workaround. To disable it, choose
Escape to loader prompt
in the boot menu
and enter the following lines from loader(8) prompt,
after an OK
:
set vfs.unmapped_buf_allowed=0 boot
Note that the following line has to be added to
/boot/loader.conf
after a boot. It
disables unmapped I/O at every boot:
vfs.unmapped_buf_allowed=0
FreeBSD/i386 10.3-RELEASE installed on ZFS
may crash during boot when the ZFS pool mount is attempted
while booting an unmodified GENERIC
kernel.
As described in /usr/src/UPDATING
entry 20121223
, rebuilding the kernel
with options KSTACK_PAGES=4
has been
observed to resolve the boot-time crash. This, however, is
not an ideal solution for inclusion in the
GENERIC
kernel configuration, as
increasing KSTACK_PAGES
implicitly
decreases available usermode threads in an environment that
is already resource-starved.
Taking into account the heavy resource requirements of
ZFS, in addition to the i386-specific tuning
requirements for general workloads, using ZFS with the
FreeBSD/i386 GENERIC
kernel
is strongly discouraged.
If installing FreeBSD/i386 on ZFS, it is possible to
configure the system after installation to increase the
KSTACK_PAGES
.
When prompted by bsdinstall(8) to perform additional post-installation configuration to the system, select .
This procedure requires the system sources available
locally. If the System source code
distribution was not selected during installation, it can
be obtained using svnlite:
#
mkdir -p /usr/src#
svnlite co svn://svn.freebsd.org/base/releng/10.2 /usr/src
Build the kernel-toolchain
required
to rebuild the kernel:
#
make -C /usr/src kernel-toolchain
Next, create a kernel configuration file to increase the
KSTACK_PAGES
option:
#
printf "include GENERIC\noptions KSTACK_PAGES=4\n" >/usr/src/sys/i386/conf/
ZFS
Then build and install the
ZFS
kernel:
#
make -C /usr/src buildkernel KERNCONF=ZFS
#
make -C /usr/src installkernel KERNCONF=ZFS
It is extremely important to take note that, by
default, freebsd-update(8) will install the
GENERIC
kernel configuration, and
as such, freebsd-update(8) consumers are strongly
encouraged to avoid FreeBSD-provided kernel binary upgrades
with such configurations.
Due to an incompatibility between bsdconfig(8) and pkg(8), packages included on the FreeBSD dvd installer will not be recognized by bsdconfig(8).
To install packages from the dvd1.iso
installer, create the /dist
target directory, and
manually mount the dvd1.iso
ISO:
#
mkdir -p /dist#
mount -t cd9660 /dev/cd0
/dist
Be sure to use the correct /dev
device path for the
dvd1.iso
ISO
installer.
Next, set REPOS_DIR
to the path of the
repos/
directory
within the installer so pkg(8) will use the correct
repository metadata.
If using sh(1):
#
export REPOS_DIR=/dist/packages/repos
If using csh(1):
#
setenv REPOS_DIR /dist/packages/repos
Keep in mind that REPOS_DIR
will need
to be set again after the current shell session is
terminated, if continuing to use the packages provided on
the dvd1.iso
installer.
Finally, bootstrap pkg(8) from the ISO, and install required packages:
#
pkg bootstrap#
pkg installxorg-server
xorg
gnome3
[...]
An issue was discovered where the netstat(1)
-s
option will cause a segmentation fault
on systems with IPSEC
compiled into the
kernel. The issue was resolved in the
stable/10
branch, and an Errata Notice is
planned after 10.3-RELEASE is released.
[2015-08-19] Resolved as FreeBSD-EN-15:12.
An issue was discovered that causes make(1) to generate noisy output when doing source-based upgrades from FreeBSD 9.3 and earlier. The issue was reported in PR 202277, and after investigation and determining the issue does not cause source-based upgrades to fail, a post-release Errata Notice is planned.
[2015-08-19] Resolved as FreeBSD-EN-15:11.
An issue with FreeBSD virtual machines with
vagrant was discovered that
affects the VirtualBox where the
virtual machine will not start on the initial boot invoked
with vagrant up
.
The issue is due to the virtual machine
MAC being unset, as FreeBSD does not provide
a default Vagrantfile
.
It has been observed, however, that a subsequent
invocation of vagrant up
will allow the
virtual machine to successfully boot, allowing access via
vagrant ssh
.
[2015-08-16] An error was discovered in the release
notes for FreeBSD 10.3-RELEASE regarding the
drm
device driver. The entry for r282199
states the driver was updated to match the version Linux®
3.8.13 version, however the entry should have noted the
change affects device-independent code, and does not bring
the drm
driver fully in line with the
stated Linux® version.
This file, and other release-related documents, can be downloaded from https://www.FreeBSD.org/snapshots/.
For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.
All users of FreeBSD 10.3-STABLE should subscribe to the <stable@FreeBSD.org> mailing list.
For questions about this documentation, e-mail <doc@FreeBSD.org>.
\ No newline at end of file Index: head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html =================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html (revision 50243) +++ head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html (revision 50244) @@ -1,147 +1,147 @@ -Copyright © 2016 The FreeBSD Documentation Project
FreeBSD is a registered trademark of +
Copyright © 2016 The FreeBSD Documentation Project
FreeBSD is a registered trademark of the FreeBSD Foundation.
Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use of these trademarks by its members.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the “™” or the - “®” symbol.
This document lists errata items for FreeBSD 11.0-RELEASE, + “®” symbol.
This document lists errata items for FreeBSD 11.0-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.
This errata document for FreeBSD 11.0-RELEASE will be maintained until the release of FreeBSD 11.1-RELEASE.
This errata document contains “late-breaking news” about FreeBSD 11.0-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.
Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the “current errata” for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.
Source and binary snapshots of FreeBSD 11.0-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).
For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.
Advisory | Date | Topic |
---|---|---|
FreeBSD-SA-16:32.bhyve | 25 October 2016 | Privilege escalation vulnerability |
FreeBSD-SA-16:33.openssh | 2 November 2016 | Remote Denial of Service vulnerability |
FreeBSD-SA-16:36.telnetd | 6 December 2016 | Possible login(1) argument injection |
FreeBSD-SA-16:37.libc | 6 December 2016 | link_ntoa(3) buffer overflow |
FreeBSD-SA-16:38.bhyve | 6 December 2016 | Possible escape from bhyve(8) virtual - machine |
FreeBSD-SA-16:39.ntp | 22 December 2016 | Multiple vulnerabilities |
FreeBSD-SA-17:01.openssh | 10 January 2017 | Multiple vulnerabilities |
FreeBSD-SA-17:02.openssl | 23 February 2017 | Multiple vulnerabilities |
FreeBSD-SA-17:03.ntp | 12 April 2017 | Multiple vulnerabilities |
Errata | Date | Topic |
---|---|---|
FreeBSD-EN-16:18.loader | 25 October 2016 | Loader may hang during boot |
FreeBSD-EN-16:19.tzcode | 6 December 2016 | Fix warnings about invalid timezone + machine |
FreeBSD-SA-16:39.ntp | 22 December 2016 | Multiple vulnerabilities |
FreeBSD-SA-17:01.openssh | 10 January 2017 | Multiple vulnerabilities |
FreeBSD-SA-17:02.openssl | 23 February 2017 | Multiple vulnerabilities |
FreeBSD-SA-17:03.ntp | 12 April 2017 | Multiple vulnerabilities |
FreeBSD-SA-17:04.ipfilter | 27 April 2017 | Fix fragment handling panic |
Errata | Date | Topic |
---|---|---|
FreeBSD-EN-16:18.loader | 25 October 2016 | Loader may hang during boot |
FreeBSD-EN-16:19.tzcode | 6 December 2016 | Fix warnings about invalid timezone abbreviations |
FreeBSD-EN-16:20.tzdata | 6 December 2016 | Update timezone database information |
FreeBSD-EN-16:21.localedef | 6 December 2016 | Fix incorrectly defined unicode characters |
FreeBSD-EN-17:01.pcie | 23 February 2017 | Fix system hang when booting when PCI-express HotPlug is enabled |
FreeBSD-EN-17:02.yp | 23 February 2017 | Fix NIS master updates are not pushed to an NIS slave |
FreeBSD-EN-17:03.hyperv | 23 February 2017 | Fix compatibility with Hyper-V/storage after KB3172614 or KB3179574 |
FreeBSD-EN-17:04.mandoc | 23 February 2017 | Make makewhatis(1) output reproducible |
FreeBSD-EN-17:05.xen | 23 February 2017 | Xen migration enhancements |
An issue was discovered with Amazon® EC2™ images which would cause the virtual machine to hang during boot when upgrading from previous FreeBSD versions. New EC2™ installations are not affected, but existing installations running earlier releases are advised to wait until the issue is resolved in an Errata Notice before upgrading. An Errata Notice to address this is planned following the release.
FreeBSD/i386 installed on ZFS may crash during boot
when the ZFS pool mount is attempted while booting an
unmodified GENERIC
kernel.
A system tunable has been added as of revision
r286584
to make the
kern.kstack_pages
tunable configurable
without recompiling the kernel.
To mitigate system crashes with such configurations,
chose Escape to loader prompt
in the boot
menu and enter the following lines from loader(8)
prompt, after an OK
:
set kern.kstack_pages=4 boot
Add this line to
/boot/loader.conf
for the change to
persist across reboots:
kern.kstack_pages=4
A bug was diagnosed in interaction of the
pmap_activate()
function and
TLB shootdown IPI
handler on amd64 systems which have PCID
features but do not implement the INVPCID
instruction. On such machines, such as SandyBridge™
and IvyBridge™ microarchitectures, set the loader
tunable vm.pmap.pcid_enabled=0
during
boot:
set vm.pmap.pcid_enabled=0 boot
Add this line to
/boot/loader.conf
for the change to
persist across reboots:
To check if the system is affected, check dmesg(8) for PCID listed in the "Features2", and absence of INVPCID in the "Structured Extended Features". If the PCID feature is not present, or INVPCID is present, system is not affected.
vm.pmap.pcid_enabled=0
The Release Notes erroneously states the
WITH_SYSTEM_COMPILER
src.conf(5)
option is enabled by default, however this was disabled
prior to the final release build.
The release announcement stated "Wireless support for 802.11n has been added." This was intended to state "Wireless support for 802.11n has been added for additional wireless network drivers."
Some release notes pertaining to the Cavium ThunderX platform (the FreeBSD/arm64 reference platform) were omitted:
[2016-10-20] Several recent Dell systems fail to find a bootable disk when the system boots in Legacy/BIOS/CSM mode, the boot disk is partitioned with GPT, and the Active flag in the Protective MBR is not set. To work around this issue, either configure the system to boot in UEFI mode, or choose the "GPT + Active" scheme. [r293860]
[2016-10-21] Support for sha512
and
skein
checksumming has been added to the
ZFS filesystem. This was not mentioned
in the release notes.
Systems being upgraded from earlier FreeBSD releases with
ZFS will see a message in zpool
status
output noting the pool is not at the
latest version, and some features may not be enabled.
Additional instructions on how to update
ZFS pools to the latest version and
update the boot blocks for all boot drives in the pool will
also be provided in the output.
This information is also documented in
/usr/src/UPDATING
, which is included if
the src
component is selected during
installation.
[2016-10-21] The size of the GPT
enabled ZFS boot blocks
(/boot/gptzfsboot
) has increased past
64K. Systems upgraded from older releases may experience
a problem where the size of the existing
"freebsd-boot" partition is too small to hold the
new gptzfsboot
.
Systems where the boot partition is immediately followed
by the swap partition, such as those installed via
bsdinstall(8), can resize the swap partition slightly
using the gpart(8) resize
command,
so space can be reclaimed to increase the size of the
freebsd-boot partition.
[2016-10-21] Due to a bug in earlier versions of clang(1) that is difficult to work around in the upgrade process, to upgrade the system from sources via buildworld to -CURRENT or 11.0-RELEASE, it is necessary to upgrade machines running 9.x to at least revision r286035, or machines running 10.x to revision r286033. Source-based upgrades from 10.3-RELEASE are not affected. This differs from the historical situation where one could generally upgrade from anywhere on earlier stable branches, so caution should be exercised.
This file, and other release-related documents, can be downloaded from https://www.FreeBSD.org/snapshots/.
For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.
All users of FreeBSD 11.0-STABLE should subscribe to the <stable@FreeBSD.org> mailing list.
For questions about this documentation, e-mail <doc@FreeBSD.org>.
\ No newline at end of file