Index: stable/10/release/doc/en_US.ISO8859-1/errata/article.xml
===================================================================
--- stable/10/release/doc/en_US.ISO8859-1/errata/article.xml (revision 271686)
+++ stable/10/release/doc/en_US.ISO8859-1/errata/article.xml (revision 271687)
@@ -1,357 +1,364 @@
%release;
]>
&os; &release.prev; Errata The &os; Project$FreeBSD$2014The &os; Documentation
Project
&tm-attrib.freebsd;
&tm-attrib.intel;
&tm-attrib.sparc;
&tm-attrib.general;
This document lists errata items for &os; &release.prev;,
containing significant information discovered after the
release or too late in the release cycle to be otherwise
included in the release documentation. This information
includes security advisories, as well as news relating to the
software or documentation that could affect its operation or
usability. An up-to-date version of this document should
always be consulted before installing this version of
&os;.This errata document for &os; &release.prev; will be
maintained until the release of &os; &release.next;.IntroductionThis errata document contains late-breaking
news about &os; &release.prev; Before installing this
version, it is important to consult this document to learn about
any post-release discoveries or problems that may already have
been found and fixed.Any version of this errata document actually distributed
with the release (for example, on a CDROM distribution) will be
out of date by definition, but other copies are kept updated on
the Internet and should be consulted as the current
errata for this release. These other copies of the
errata are located at , plus any
sites which keep up-to-date mirrors of this location.Source and binary snapshots of &os; &release.branch; also
contain up-to-date copies of this document (as of the time of
the snapshot).For a list of all &os; CERT security advisories, see or .Security AdvisoriesAdvisoryDateTopicSA-13:14.openssh19 November 2013OpenSSH AES-GCM memory corruption
vulnerabilitySA-14:01.bsnmpd14 January 2014bsnmpd remote denial of service vulnerabilitySA-14:02.ntpd14 January 2014ntpd distributed reflection Denial of Service vulnerabilitySA-14:03.openssl14 January 2014OpenSSL multiple vulnerabilitiesSA-14:04.bind14 January 2014BIND remote denial of service vulnerabilitySA-14:05.nfsserver8 April 2014Deadlock in the NFS serverSA-14:06.openssl8 April 2014OpenSSL multiple vulnerabilitiesSA-14:07.devfs30 April 2014Fix devfs rules not applied by default for
jailsSA-14:08.tcp30 April 2014Fix TCP reassembly
vulnerabilitySA-14:09.openssl30 April 2014Fix OpenSSL use-after-free
vulnerabilitySA-14:10.openssl15 May 2014Fix OpenSSL NULL pointer deference
vulnerabilitySA-14:11.sendmail3 June 2014Fix sendmail improper close-on-exec flag
handlingSA-14:13.pam3 June 2014Fix incorrect error handling in PAM policy
parserSA-14:14.openssl5 June 2014Multiple vulnerabilitiesSA-14:15.iconv24 June 2014NULL pointer dereference and out-of-bounds
array accessSA-14:16.file24 June 2014Multiple vulnerabilitiesSA-14:17.kmem8 July 2014Kernel memory disclosure in control messages
and SCTP notificationsSA-14:18.openssl9 September 2014Multiple vulnerabilities
+
+
+ SA-14:19.tcp
+ 16 September 2014
+ Denial of Service in TCP packet
+ processing.
+ Open Issues&os;/&arch.i386; &release.prev; running as a guest
operating system on VirtualBox
can have a problem with disk I/O access. It depends on some
specific hardware configuration and does not depend on a
specific version of VirtualBox or
host operating system.It causes various errors and makes &os; quite unstable.
Although the cause is still unclear, disabling unmapped I/O
works as a workaround. To disable it, choose
Escape to loader prompt in the boot menu
and enter the following lines from &man.loader.8; prompt,
after an OK:set vfs.unmapped_buf_allowed=0
bootNote that the following line has to be added to
/boot/loader.conf after a boot. It
disables unmapped I/O at every boot:vfs.unmapped_buf_allowed=0[2014-04-03 update] It has been reported that
instability may be present on virtual machines running
on other hypervisors, such as Xen or KVM.A bug in Heimdal (an
implementation of Kerberos
authentication in &os; base system) has been fixed. It
could cause an interoperability issue between
Heimdal and the other
implementations including MIT
Kerberos. However, due to this fix,
Heimdal and some applications
which depend on it in the previous &os; releases do not work
with one in &release.prev; in certain cases. Errata Notice
for the supported releases to fix it will be
released.A bug in &man.killall.1; has been discovered. It
makes killall -INT to deliver
SIGTERM rather than the desired
SIGINT, and may cause blocking
behavior for scripts that uses it, as -I
means interactive. A workaround of this
would be to use -SIGINT instead.
This bug has been fixed on &os;-CURRENT and will be fixed
in &os; &release.current;.The &man.bxe.4; driver can cause packet corruption when
TSO (TCP Segmentation Offload) feature is enabled. This
feature is enabled by default and can be disabled by using a
parameter of &man.ifconfig.8;. It can
be specified in &man.rc.conf.5; like the following:ifconfig_bxe0="DHCP -tso"This bug has been fixed on &os;
&release.current;.Due to a minor incompatibility with &man.pkg.7; version
1.2.x, &man.bsdconfig.8; will duplicate
the list of available packages for installation. This is
due to the PACKAGESITE environment
variable being set for backwards compatibility with older
versions of &man.pkg.7;. This affects generation of the
available package list only, and does not affect the
behavior when processing packages for installation.A regression in &man.pw.8; does not remove a user from
groups not specified in the provided group list when the
-G flag is used. This is expected to be
corrected in &os;-CURRENT and &os; &release.current;.&man.ipfw.8; fwd action can send
packets to the correct interface with a wrong link-layer
address when the route is updated. This bug has been fixed
on &os;-CURRENT and will be fixed in &os;
&release.current;.The &man.mount.udf.8; utility has a bug which prevents
it from mounting any UDF file system. This has been fixed
in &os;-CURRENT and &os; &release.current;.Updating LSI firmware on &man.mps.4; controllers with
the sas2flash utility may cause
the system to hang, or may cause the system to panic. This
is fixed in the stable/10 branch with
revisions r262553 and
r262575, and will be included in
&os; 10.1-RELEASE.Late-Breaking NewsNo news.
Index: stable/9/release/doc/en_US.ISO8859-1/errata/article.xml
===================================================================
--- stable/9/release/doc/en_US.ISO8859-1/errata/article.xml (revision 271686)
+++ stable/9/release/doc/en_US.ISO8859-1/errata/article.xml (revision 271687)
@@ -1,118 +1,125 @@
%release;
]>
&os; &release.current; Errata
The &os; Project
$FreeBSD$2014The &os; Documentation Project
&tm-attrib.freebsd;
&tm-attrib.intel;
&tm-attrib.sparc;
&tm-attrib.general;
This document lists errata items for &os; &release.current;,
containing significant information discovered after the release
or too late in the release cycle to be otherwise included in the
release documentation.
This information includes security advisories, as well as news
relating to the software or documentation that could affect its
operation or usability. An up-to-date version of this document
should always be consulted before installing this version of
&os;.This errata document for &os; &release.current;
will be maintained until the EoL of &os; &release.branch;.IntroductionThis errata document contains late-breaking news
about &os; &release.current;
Before installing this version, it is important to consult this
document to learn about any post-release discoveries or problems
that may already have been found and fixed.Any version of this errata document actually distributed
with the release (for example, on a CDROM distribution) will be
out of date by definition, but other copies are kept updated on
the Internet and should be consulted as the current
errata for this release. These other copies of the
errata are located at http://www.FreeBSD.org/releases/, plus any sites
which keep up-to-date mirrors of this location.Source and binary snapshots of &os; &release.branch; also
contain up-to-date copies of this document (as of the time of
the snapshot).For a list of all &os; CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.Security AdvisoriesProblems described in the following security advisories have
been fixed in &release.current;. For more information, consult
the individual advisories available from
http://security.FreeBSD.org/.AdvisoryDateTopicSA-14:18.openssl9 September 2014Multiple vulnerabilities
+
+
+ SA-14:19.tcp
+ 16 September 2014
+ Denial of Service in TCP packet
+ processing.
+ Late-Breaking NewsNo late-breaking news.