2 FreeBSD errata document. Unlike some of the other RELNOTESng
3 files, this file should remain as a single SGML file, so that
4 the dollar FreeBSD dollar header has a meaningful modification
5 time. This file is all but useless without a datestamp on it,
6 so we'll take some extra care to make sure it has one.
8 (If we didn't do this, then the file with the datestamp might
9 not be the one that received the last change in the document.)
13 <!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN" [
14 <!ENTITY % articles.ent PUBLIC "-//FreeBSD//ENTITIES DocBook FreeBSD Articles Entity Set//EN">
17 <!ENTITY % release PUBLIC "-//FreeBSD//ENTITIES Release Specification//EN">
24 <![ %release.type.current [
27 <![ %release.type.snapshot [
30 <![ %release.type.release [
39 <pubdate>$FreeBSD$</pubdate>
43 <holder role="mailto:doc@FreeBSD.org">The &os; Documentation Project</holder>
46 <legalnotice id="trademarks" role="trademarks">
55 <para>This document lists errata items for &os;
56 <![ %release.type.current [
59 <![ %release.type.snapshot [
62 <![ %release.type.release [
65 containing significant information discovered after the release
66 or too late in the release cycle to be otherwise included in the
67 release documentation.
68 This information includes security advisories, as well as news
69 relating to the software or documentation that could affect its
70 operation or usability. An up-to-date version of this document
71 should always be consulted before installing this version of
74 <para>This errata document for &os;
75 <![ %release.type.current [
78 <![ %release.type.snapshot [
81 <![ %release.type.release [
84 will be maintained until the release of &os; &release.next;.</para>
88 <title>Introduction</title>
90 <para>This errata document contains <quote>late-breaking news</quote>
92 <![ %release.type.current [
95 <![ %release.type.snapshot [
98 <![ %release.type.release [
101 Before installing this version, it is important to consult this
102 document to learn about any post-release discoveries or problems
103 that may already have been found and fixed.</para>
105 <para>Any version of this errata document actually distributed
106 with the release (for example, on a CDROM distribution) will be
107 out of date by definition, but other copies are kept updated on
108 the Internet and should be consulted as the <quote>current
109 errata</quote> for this release. These other copies of the
110 errata are located at <ulink
111 url="http://www.FreeBSD.org/releases/"></ulink>, plus any sites
112 which keep up-to-date mirrors of this location.</para>
114 <para>Source and binary snapshots of &os; &release.branch; also
115 contain up-to-date copies of this document (as of the time of
116 the snapshot).</para>
118 <para>For a list of all &os; CERT security advisories, see <ulink
119 url="http://www.FreeBSD.org/security/"></ulink> or <ulink
120 url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/"></ulink>.</para>
124 <sect1 id="security">
125 <title>Security Advisories</title>
127 <para>Problems described in the following security advisories have
128 been fixed in &release.current;. For more information, consult
129 the individual advisories available from <ulink
130 url="http://security.FreeBSD.org/"></ulink>.</para>
132 <informaltable frame="none" pgwide="1">
134 <colspec colwidth="1*">
135 <colspec colwidth="1*">
136 <colspec colwidth="3*">
140 <entry>Advisory</entry>
148 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:01.mountd.asc"
149 >SA-11:01.mountd</ulink></entry>
150 <entry>20 April 2011</entry>
151 <entry><para>Network ACL mishandling in &man.mountd.8;</para></entry>
155 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc"
156 >SA-11:02.bind</ulink></entry>
157 <entry>28 May 2011</entry>
158 <entry><para>BIND remote DoS with large RRSIG RRsets and negative
159 caching</para></entry>
163 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:04.compress.asc"
164 >SA-11:04.compress</ulink></entry>
165 <entry>28 September 2011</entry>
166 <entry><para>Errors handling corrupt compress file in
167 &man.compress.1; and &man.gzip.1;</para></entry>
171 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:05.unix.asc"
172 >SA-11:05.unix</ulink></entry>
173 <entry>28 September 2011</entry>
174 <entry><para>Buffer overflow in handling of UNIX socket
175 addresses</para></entry>
179 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:06.bind.asc"
180 >SA-11:06.bind</ulink></entry>
181 <entry>23 December 2011</entry>
182 <entry><para>Remote packet Denial of Service against &man.named.8;
183 servers</para></entry>
187 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:07.chroot.asc"
188 >SA-11:07.chroot</ulink></entry>
189 <entry>23 December 2011</entry>
190 <entry><para>Code execution via chrooted ftpd</para></entry>
194 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:08.telnetd.asc"
195 >SA-11:08.telnetd</ulink></entry>
196 <entry>23 December 2011</entry>
197 <entry><para>telnetd code execution vulnerability</para></entry>
201 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:09.pam_ssh.asc"
202 >SA-11:09.pam_ssh</ulink></entry>
203 <entry>23 December 2011</entry>
204 <entry><para>pam_ssh improperly grants access when user account has
205 unencrypted SSH private keys</para></entry>
209 <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:10.pam.asc"
210 >SA-11:10.pam</ulink></entry>
211 <entry>23 December 2011</entry>
212 <entry><para><function>pam_start()</function> does not validate
213 service names</para></entry>
220 <sect1 id="open-issues">
221 <title>Open Issues</title>
225 <para>In some releases prior to &release.current;, upgrading
226 by using &man.freebsd-update.8; can fail. This issue has
227 been fixed by a change in Errata Notice EN-12:01. For more
228 information, see <ulink
229 url="http://security.freebsd.org/advisories/FreeBSD-EN-12:01.freebsd-update.asc"></ulink></para>
233 <para arch="amd64,i386">&os; &release.current; includes
234 several changes to improve resource management of PCI
235 devices. Some x86 machines may not boot or may have devices
236 that no longer attach when using ACPI as a result of these
237 changes. This can be worked around by setting a
238 &man.loader.8; tunable
239 <varname>debug.acpi.disabled</varname> to
240 <literal>hostres</literal>. To do this, enter the following
241 lines at the loader prompt:</para>
243 <screen>set debug.acpi.disabled="hostres"
246 <para>Or, put the following line into
247 <filename>/boot/loader.conf</filename>:</para>
249 <programlisting>debug.acpi.disabled="hostres"</programlisting>
253 <para>A &man.devctl.4; event upon arrival of a &man.ugen.4;
254 device has been changed. The event now includes
255 <literal>ugen</literal> and <literal>cdev</literal>
256 variables instead of <literal>device-name</literal>. This
257 change can prevent the following &man.devd.8; rule which
258 worked in a previous releases from working:</para>
260 <programlisting>attach 0 {
261 match "device-name" "ugen[0-9]+.[0-9]+";
262 action "/path/to/script /dev/$device-name";
265 <para>This should be updated to the following:</para>
267 <programlisting>attach 0 {
268 match "subsystem" "DEVICE";
269 match "type" "ATTACH";
270 match "cdev" "ugen[0-9]+.[0-9]+";
271 action "/path/to/script /dev/$cdev";
276 <para>The &os; &release.current; Release Notes should have
277 mentioned that SSM (Source-Specific Multicast) MLDv2 now
278 uses <literal>ALLOW_NEW_SOURCES</literal> and
279 <literal>BLOCK_OLD_SOURCES</literal> record types to signal
280 a join or a leave by default. This conforms RFC 4604,
281 <quote>Using Internet Group Management Protocol Version 3
282 (IGMPv3) and Multicast Listener Discovery Protocol Version 2
283 (MLDv2) for Source-Specific Multicast</quote>. A new
284 &man.sysctl.8; variable
285 <varname>net.inet6.mld.use_allow</varname> which controls
286 the behavior has been added. The default value is
287 <literal>1</literal> (use
288 <literal>ALLOW_NEW_SOURCES</literal> and
289 <literal>BLOCK_OLD_SOURCES</literal>).</para>
293 <para>&release.current; fails to configure an interface
294 specified in the &man.rc.conf.5; variable
295 <varname>ipv6_prefix_<replaceable>IF</replaceable></varname>
296 when the interface does not have a corresponding
297 <varname>ifconfig_<replaceable>IF</replaceable>_ipv6</varname>
298 variable. This problem will be fixed in the future
299 releases. To work around this problem on &release.current;,
301 <varname>ifconfig_<replaceable>IF</replaceable>_ipv6</varname>
302 line for each interface specified in
303 <varname>ipv6_prefix_<replaceable>IF</replaceable></varname>
304 as the following:</para>
306 <programlisting>ipv6_prefix_em0="2001:db8:1:0 2001:db8:2:0"
307 ifconfig_em0_ipv6="inet6 auto_linklocal"</programlisting>
311 <para>In &release.current; the &os; USB subsystem supports USB
312 3.0 by the &man.xhci.4; driver. However, a bug that could
313 prevent it from working with a USB 3.0 hub has been found
314 and fixed after the release date. This means
315 &release.current; and prior do not work with a USB 3.0 hub.
316 This problem has been fixed in HEAD and will be merged into
317 the 9-STABLE branch.</para>
322 <sect1 id="late-news">
323 <title>Late-Breaking News</title>
325 <![ %release.type.current [
326 <para>No news.</para>
329 <![ %release.type.release [
330 <para>No news.</para>
333 <![ %release.type.snapshot [
334 <para>No news.</para>