Index: stable/10/release/doc/en_US.ISO8859-1/errata/article.xml =================================================================== --- stable/10/release/doc/en_US.ISO8859-1/errata/article.xml (revision 273084) +++ stable/10/release/doc/en_US.ISO8859-1/errata/article.xml (revision 273085) @@ -1,364 +1,143 @@ %release; ]>
&os; &release.current; Errata The &os; Project $FreeBSD$ 2014 The &os; Documentation Project &tm-attrib.freebsd; &tm-attrib.intel; &tm-attrib.sparc; &tm-attrib.general; This document lists errata items for &os; &release.current;, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of &os;. This errata document for &os; &release.current; will be maintained until the release of &os; &release.next;. Introduction This errata document contains late-breaking news about &os; &release.prev; Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the current errata for this release. These other copies of the errata are located at , plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of &os; &release.branch; also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all &os; CERT security advisories, see or . Security Advisories Advisory Date Topic - SA-13:14.openssh - - 19 November 2013 - - OpenSSH AES-GCM memory corruption - vulnerability + No advisories. +   +   - - - SA-14:01.bsnmpd - - 14 January 2014 - - bsnmpd remote denial of service vulnerability - - - - SA-14:02.ntpd - - 14 January 2014 - - ntpd distributed reflection Denial of Service vulnerability - - - - SA-14:03.openssl - - 14 January 2014 - - OpenSSL multiple vulnerabilities - - - - SA-14:04.bind - - 14 January 2014 - - BIND remote denial of service vulnerability - - - - SA-14:05.nfsserver - - 8 April 2014 - - Deadlock in the NFS server - - - - SA-14:06.openssl - - 8 April 2014 - - OpenSSL multiple vulnerabilities - - - - SA-14:07.devfs - 30 April 2014 - Fix devfs rules not applied by default for - jails - - - - SA-14:08.tcp - 30 April 2014 - Fix TCP reassembly - vulnerability - - - - SA-14:09.openssl - 30 April 2014 - Fix OpenSSL use-after-free - vulnerability - - - - SA-14:10.openssl - 15 May 2014 - Fix OpenSSL NULL pointer deference - vulnerability - - - - SA-14:11.sendmail - 3 June 2014 - Fix sendmail improper close-on-exec flag - handling - - - - SA-14:13.pam - 3 June 2014 - Fix incorrect error handling in PAM policy - parser - - - - SA-14:14.openssl - 5 June 2014 - Multiple vulnerabilities - - - - SA-14:15.iconv - 24 June 2014 - NULL pointer dereference and out-of-bounds - array access - - - - SA-14:16.file - 24 June 2014 - Multiple vulnerabilities - - - - SA-14:17.kmem - 8 July 2014 - Kernel memory disclosure in control messages - and SCTP notifications - - - - SA-14:18.openssl - 9 September 2014 - Multiple vulnerabilities - - - - SA-14:19.tcp - 16 September 2014 - Denial of Service in TCP packet - processing. - Open Issues &os;/&arch.i386; &release.prev; running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a specific version of VirtualBox or host operating system. It causes various errors and makes &os; quite unstable. Although the cause is still unclear, disabling unmapped I/O works as a workaround. To disable it, choose Escape to loader prompt in the boot menu and enter the following lines from &man.loader.8; prompt, after an OK: set vfs.unmapped_buf_allowed=0 boot Note that the following line has to be added to /boot/loader.conf after a boot. It disables unmapped I/O at every boot: vfs.unmapped_buf_allowed=0 [2014-04-03 update] It has been reported that instability may be present on virtual machines running on other hypervisors, such as Xen or KVM. - - - - A bug in Heimdal (an - implementation of Kerberos - authentication in &os; base system) has been fixed. It - could cause an interoperability issue between - Heimdal and the other - implementations including MIT - Kerberos. However, due to this fix, - Heimdal and some applications - which depend on it in the previous &os; releases do not work - with one in &release.prev; in certain cases. Errata Notice - for the supported releases to fix it will be - released. - - - - A bug in &man.killall.1; has been discovered. It - makes killall -INT to deliver - SIGTERM rather than the desired - SIGINT, and may cause blocking - behavior for scripts that uses it, as -I - means interactive. A workaround of this - would be to use -SIGINT instead. - This bug has been fixed on &os;-CURRENT and will be fixed - in &os; &release.current;. - - - - The &man.bxe.4; driver can cause packet corruption when - TSO (TCP Segmentation Offload) feature is enabled. This - feature is enabled by default and can be disabled by using a - parameter of &man.ifconfig.8;. It can - be specified in &man.rc.conf.5; like the following: - - ifconfig_bxe0="DHCP -tso" - - This bug has been fixed on &os; - &release.current;. - - - - Due to a minor incompatibility with &man.pkg.7; version - 1.2.x, &man.bsdconfig.8; will duplicate - the list of available packages for installation. This is - due to the PACKAGESITE environment - variable being set for backwards compatibility with older - versions of &man.pkg.7;. This affects generation of the - available package list only, and does not affect the - behavior when processing packages for installation. - - - - A regression in &man.pw.8; does not remove a user from - groups not specified in the provided group list when the - -G flag is used. This is expected to be - corrected in &os;-CURRENT and &os; &release.current;. - - - - &man.ipfw.8; fwd action can send - packets to the correct interface with a wrong link-layer - address when the route is updated. This bug has been fixed - on &os;-CURRENT and will be fixed in &os; - &release.current;. - - - - The &man.mount.udf.8; utility has a bug which prevents - it from mounting any UDF file system. This has been fixed - in &os;-CURRENT and &os; &release.current;. - - - - Updating LSI firmware on &man.mps.4; controllers with - the sas2flash utility may cause - the system to hang, or may cause the system to panic. This - is fixed in the stable/10 branch with - revisions r262553 and - r262575, and will be included in - &os; 10.1-RELEASE. Late-Breaking News No news.