FreeBSD 8.4-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use of these trademarks by its members.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the symbol.

Last modified on 2015-02-05 by gjb.
Abstract

This document lists errata items for FreeBSD 8.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 8.4-RELEASE will be maintained until the FreeBSD 8.4-RELEASE end of life.


Table of Contents
1. Introduction
2. Security Advisories
3. Errata Notices
4. Open Issues
5. Late-Breaking News and Corrections

1.�Introduction

This errata document contains late-breaking news about FreeBSD 8.4-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.

Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the current errata for this release. These other copies of the errata are located at http://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 8.4-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.�Security Advisories

Problems described in the following security advisories have been fixed in 8.4-RELEASE. For more information, consult the individual advisories available from http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-13:07.bind26�July�2013

Denial of Service vulnerability in named(8)

FreeBSD-SA-13:09.ip_multicast21�August�2013

Integer overflow in computing the size of a temporary buffer can result in a buffer which is too small for the requested operation

FreeBSD-SA-13:10.sctp21�August�2013

Fix a bug that could lead to kernel memory disclosure with SCTP state cookie

FreeBSD-SA-13:12.ifioctl10�September�2013

In IPv6 and NetATM, stop SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK at the socket layer rather than pass them on to the link layer without validation or credential checks

FreeBSD-SA-13:13.nullfs10�September�2013

Prevent cross-mount hardlinks between different nullfs mounts of the same underlying filesystem

FreeBSD-SA-14:01.bsnmpd14�January�2014

bsnmpd remote denial of service vulnerability

FreeBSD-SA-14:02.ntpd14�January�2014

ntpd distributed reflection Denial of Service vulnerability

FreeBSD-SA-14:04.bind14�January�2014

BIND remote denial of service vulnerability

FreeBSD-SA-14:05.nfsserver8�April�2014

NFS deadlock vulnerability

FreeBSD-SA-14:06.openssl8�April�2014

ECDSA Cache Side-channel Attack in OpenSSL

FreeBSD-SA-14:08.tcp30�April�2014

TCP reassembly vulnerability

FreeBSD-SA-14:11.sendmail5�June�2014

sendmail improper close-on-exec flag handling

FreeBSD-SA-14:12.ktrace5�June�2014

ktrace memory disclosure

FreeBSD-SA-14:14.openssl5�June�2014

OpenSSL multiple vulnerabilities

FreeBSD-SA-14:16.file5�June�2014

Multiple vulnerabilities in file(1) and libmagic(3)

FreeBSD-SA-14:17.kmem8�July�2014

kernel memory disclosure in control message and SCTP notifications

FreeBSD-SA-14:18.openssl9�September�2014

Multiple vulnerabilities in OpenSSL

FreeBSD-SA-14:19.tcp16�September�2014

Denial of Service in TCP packet processing

FreeBSD-SA-14:21.routed21�October�2014

routed(8) denial of service vulnerability

FreeBSD-SA-14:23.openssl21�October�2014

Multiple vulnerabilities in OpenSSL

FreeBSD-SA-14:25.setlogin4�November�2014

kernel stack disclosure in setlogin(2) and getlogin(2)

FreeBSD-SA-14:26.ftp4�November�2014

Remote command execution in ftp(1)

FreeBSD-SA-14:28.file10�December�2014

Multiple vulnerabilities in file(1) and libmagic(3)

FreeBSD-SA-14:29.bind10�December�2014

BIND remote denial of service vulnerability

FreeBSD-SA-14:31.ntp23�December�2014

Multiple vulnerabilities in NTP suite

FreeBSD-SA-15:01.ntp14�January�2015

Multiple vulnerabilities in OpenSSL

FreeBSD-SA-15:02.kmem27�January�2015

Fix SCTP SCTP_SS_VALUE kernel memory corruption and disclosure vulnerability

FreeBSD-SA-15:03.sctp27�January�2015

Fix SCTP stream reset vulnerability

FreeBSD-SA-15:04.igmp25�February�2015

Integer overflow in IGMP protocol

FreeBSD-SA-15:05.igmp25�February�2015

Remote denial of service vulnerability

FreeBSD-SA-15:06.openssl19�March�2015

Multiple vulnerabilities

FreeBSD-SA-15:07.ntp7�April�2015

Multiple vulnerabilities

FreeBSD-SA-15:09.ipv67�April�2015

Router advertisement Denial of Service

FreeBSD-SA-15:10.openssl16�June�2015

Multiple vulnerabilities

FreeBSD-SA-15:11.bind7�July�2015

Resolver remote denial of service

FreeBSD-SA-15:13.tcp21�July�2015

resource exhaustion due to sessions stuck in LAST_ACK state.

FreeBSD-SA-15:15.tcp28�July�2015

resource exhaustion in TCP reassembly

FreeBSD-SA-15:16.openssh28�July�2015

Multiple vulnerabilities

FreeBSD-SA-15:17.bind28�July�2015

Remote denial of service vulnerability

3.�Errata Notices

ErrataDateTopic
FreeBSD-EN-13:01.fxp28�June�2013

Fixed a problem where dhclient(8) would infinitely try to intialize fxp(4)

FreeBSD-EN-13:02.vtnet28�June�2013

Fixed a problem frames sent to additional MAC addresses are not forwarded to the vtnet(4) interface

FreeBSD-EN-13:04.freebsd-update26�October�2013

Multiple fixes

FreeBSD-EN-13:05.freebsd-update28�November�2013

Fix INDEX generation

FreeBSD-EN-14:01.random14�January�2014

Disable hardware RNGs by default

FreeBSD-EN-14:02.mmap14�January�2014

Fix incorrect coalescing of stack entry

FreeBSD-EN-14:03.pkg15�May�2014

Add pkg bootstrapping, configuration and public keys

FreeBSD-EN-14:04.kldxref15�May�2014

Improve build repeatability for kldxref(8)

FreeBSD-EN-14:06.exec3�June�2014

Fix triple-fault when executing from a threaded process

FreeBSD-EN-14:08.heimdal24�June�2014

Fix gss_pseudo_random() interoperability issue

FreeBSD-EN-14:09.jail8�July�2014

Fix jail fails to start if WITHOUT_INET/WITHOUT_INET6 is use

FreeBSD-EN-14:10.tzdata21�October�2014

Time zone data file update

FreeBSD-EN-14:12.zfs4�November�2014

Fix NFSv4 and ZFS cache consistency issue

FreeBSD-EN-14:13.freebsd-update23�December�2014

Fix directory deletion issue

FreeBSD-EN-15:02.openssl25�February�2015

OpenSSL update

FreeBSD-EN-15:03.freebsd-update25�February�2015

freebsd-update(8) updates libraries in suboptimal order

FreeBSD-EN-15:04.freebsd-update13�May�2015

freebsd-update(8) does not ensure the previous upgrade has completed

FreeBSD-EN-15:06.file9�June�2015

Multiple denial of service issues

FreeBSD-EN-15:08.sendmail30�June�2015 (revised)

Sendmail TLS/DH interoperability improvement

4.�Open Issues

[20130613] The vtnet(4) network interface driver displays the following message upon configuration when using QEMU 1.4.1 and later:

vtnet0: error setting host MAC filter table

This message is harmless when the interface has only one MAC address. The patch for this issue is filed to a PR kern/178955.

[20130609] There is incompatibility in jail(8) configuration because the jail(8) utility and rc.d/jail script has been changed. More specifically, the following sysctl(8) variables cannot be used to set the default parameters for jails:

security.jail.mount_zfs_allowed
security.jail.mount_procfs_allowed
security.jail.mount_nullfs_allowed
security.jail.mount_devfs_allowed
security.jail.mount_allowed
security.jail.chflags_allowed
security.jail.allow_raw_sockets
security.jail.sysvipc_allowed
security.jail.socket_unixiproute_only
security.jail.set_hostname_allowed

These could be set by manually using sysctl(8) utility, the sysctl.conf(5) file, or for some of them the following variables in rc.conf(5):

jail_set_hostname_allow="yes"
jail_socket_unixiproute_only="yes"
jail_sysvipc_allow="yes"

These parameters must now be specified in jail_parameters (or jail_jailname_parameters for per-jail configuration) in rc.conf(5). For example:

jail_parameters="allow.sysvipc allow.raw_sockets"

The valid keywords are the following. For more detail, see jail(8) manual page.

allow.set_hostname
allow.sysvipc
allow.raw_sockets
allow.chflags
allow.mount
allow.mount.devfs
allow.mount.nullfs
allow.mount.procfs
allow.mount.zfs
allow.quotas
allow.socket_af

[20130608] FreeBSD 8.4-RELEASE no longer supports FreeBSD CVS repository. Some documents mistakenly refer to RELENG_8_4_0_RELEASE as CVS tag for the release and RELENG_8_4 as CVS branch tag for the 8.4-RELEASE security branch. However, FreeBSD Project no longer supports FreeBSD CVS repository and 8.4-RELEASE has been released by using FreeBSD subversion repository instead. RELENG_8_4 corresponds to svn://svn.FreeBSD.org/base/releng/8.4, and RELENG_8_4_0_RELEASE corresponds to svn://svn.FreeBSD.org/base/release/8.4.0. Please note that FreeBSD source tree for 8.4-RELEASE and its security branch cannot be updated by using official CVSup servers.

[20130607] (removed about a bge(4) network interface driver issue because it was incorrect)

[20130606] The fxp(4) network interface driver may not work well with the dhclient(8) utility. More specifically, if the /etc/rc.conf has the following line:

ifconfig_fxp0="DHCP"

to activate a DHCP client to configure the network interface, the following notification messages are displayed and the dhclient(8) utility keeps trying to initialize the network interface forever.

kernel: fxp0: link state changed to UP
kernel: fxp0: link state changed to DOWN

A patch to fix this issue will be released as an Errata Notice.

5.�Late-Breaking News and Corrections

[20130606] As described in FreeBSD 8.4-RELEASE Release Notes, FreeBSD ZFS subsystem has been updated to support feature flags for ZFS pools. However, the default version number of a newly created ZFS pool is still 28.

This is because FreeBSD 9.0 and 9.1 do not support the feature flags. This means ZFS pools with feature flag support cannot be used on FreeBSD 9.0 and 9.1. An 8.X system with v28 ZFS pools can be upgraded to 9.X with no problem. Note that zfs(8) send and receive commands do not work between pools with different versions. Once a ZFS pool is upgraded from v28, there is no way to upgrade the system to FreeBSD 9.0 and 9.1. FreeBSD 9.2 and later will support ZFS pools with feature flags.

To create a ZFS pool with feature flag support, use the zpool(8) create command and then the zpool(8) upgrade command.