English
FreeBSD 10.0-RELEASE Errata
Abstract
This document lists errata items for FreeBSD 10.0-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.
This errata document for FreeBSD 10.0-RELEASE will be maintained until the release of FreeBSD 10.1-RELEASE.
Table of Contents
<<intro,Introduction>>
<<security,Security Advisories>>
<<open-issues,Open Issues>>
<<late-news,Late-Breaking News>>
Introduction
This errata document contains "late-breaking news" about FreeBSD 10.0-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.
Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release. These other copies of the errata are located at http://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.
Source and binary snapshots of FreeBSD 10.0-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).
For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.
Security Advisories
|Advisory |Date |Topic
|http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc[SA-13:14.openssh] |19 November 2013 |OpenSSH AES-GCM memory corruption vulnerability
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc[SA-14:01.bsnmpd] |14 January 2014 |bsnmpd remote denial of service vulnerability
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc[SA-14:02.ntpd] |14 January 2014 |ntpd distributed reflection Denial of Service vulnerability
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc[SA-14:03.openssl] |14 January 2014 |OpenSSL multiple vulnerabilities
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc[SA-14:04.bind] |14 January 2014 |BIND remote denial of service vulnerability
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:05.nfsserver.asc[SA-14:05.nfsserver] |8 April 2014 |Deadlock in the NFS server
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc[SA-14:06.openssl] |8 April 2014 |OpenSSL multiple vulnerabilities
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:07.devfs.asc[SA-14:07.devfs] |30 April 2014 |Fix devfs rules not applied by default for jails
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc[SA-14:08.tcp] |30 April 2014 |Fix TCP reassembly vulnerability
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:09.openssl.asc[SA-14:09.openssl] |30 April 2014 |Fix OpenSSL use-after-free vulnerability
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:10.openssl.asc[SA-14:10.openssl] |15 May 2014 |Fix OpenSSL NULL pointer deference vulnerability
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:11.sendmail.asc[SA-14:11.sendmail] |3 June 2014 |Fix sendmail improper close-on-exec flag handling
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:13.pam.asc[SA-14:13.pam] |3 June 2014 |Fix incorrect error handling in PAM policy parser
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc[SA-14:14.openssl] |5 June 2014 |Multiple vulnerabilities
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc[SA-14:15.iconv] |24 June 2014 |NULL pointer dereference and out-of-bounds array access
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:16.file.asc[SA-14:16.file] |24 June 2014 |Multiple vulnerabilities
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc[SA-14:17.kmem] |8 July 2014 |Kernel memory disclosure in control messages and SCTP notifications
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc[SA-14:18.openssl] |9 September 2014 |Multiple vulnerabilities
|http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc[SA-14:19.tcp] |16 September 2014 |Denial of Service in TCP packet processing.
Open Issues
FreeBSD/i386 10.0-RELEASE running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a specific version of VirtualBox or host operating system.
It causes various errors and makes FreeBSD quite unstable. Although the cause is still unclear, disabling unmapped I/O works as a workaround. To disable it, choose `Escape to loader prompt` in the boot menu and enter the following lines from http://www.FreeBSD.org/cgi/man.cgi?query=loader&sektion=8[loader(8)] prompt, after an `OK`:
set vfs.unmapped_buf_allowed=0
boot