--- title: "FreeBSD 10.3-RELEASE Errata" sidenav: download --- = FreeBSD 10.3-RELEASE Errata == Abstract This document lists errata items for FreeBSD 10.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD 10.3-RELEASE will be maintained until the release of FreeBSD 10.3-RELEASE. === Table of Contents * <> * <> * <> * <> * <> [[intro]] == Introduction This errata document contains "late-breaking news" about FreeBSD 10.3-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on the Internet and should be consulted as the "current errata" for this release. These other copies of the errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location. Source and binary snapshots of FreeBSD 10.3-STABLE also contain up-to-date copies of this document (as of the time of the snapshot). For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/. [[security]] == Security Advisories [width="100%",cols="40%,30%,30%",options="header",] |=== |Advisory |Date |Topic |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:09.ntp.asc[FreeBSD-SA-16:09.ntp] |29 April 2016 |Multiple ntp vulnerabilities. |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:17.openssl.asc[FreeBSD-SA-16:17.openssl] |29 April 2016 |Multiple OpenSSL vulnerabilities. |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:18.atkbd.asc[FreeBSD-SA-16:18.atkbd] |17 May 2016 |Keyboard driver buffer overflow |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:19.sendmsg.asc[FreeBSD-SA-16:19.sendmsg] |17 May 2016 |Incorrect argument handling in http://www.FreeBSD.org/cgi/man.cgi?query=sendmsg&sektion=2&manpath=freebsd-release-ports[sendmsg(2)] |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:20.linux.asc[FreeBSD-SA-16:20.linux] |31 May 2016 |Kernel stack disclosure in Linux compatibility layer |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:21.43bsd.asc[FreeBSD-SA-16:21.43bsd] |31 May 2016 |Kernel stack disclosure in 4.3BSD compatibility layer |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc[FreeBSD-SA-16:22.libarchive] |31 May 2016 |Absolute path traversal vulnerability |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:23.libarchive.asc[FreeBSD-SA-16:23.libarchive] |31 May 2016 |Absolute path traversal vulnerability |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:24.ntp.asc[FreeBSD-SA-16:24.ntp] |3 June 2016 |Multiple ntp vulnerabilties |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:25.bspatch.asc[FreeBSD-SA-16:25.bspatch] |25 July 2016 |heap overflow vulnerability |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:26.openssl.asc[FreeBSD-SA-16:26.openssl] |23 September 2016 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:27.openssl.asc[FreeBSD-SA-16:27.openssl] |26 September 2016 |Regression in OpenSSL suite |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:29.bspatch.asc[FreeBSD-SA-16:29.bspatch] |10 October 2016 |Heap overflow vulnerability |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:30.portsnap.asc[FreeBSD-SA-16:30.portsnap] |10 October 2016 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:31.libarchive.asc[FreeBSD-SA-16:31.libarchive] |10 October 2016 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:33.openssh.asc[FreeBSD-SA-16:33.openssh] |2 November 2016 |Remote Denial of Service vulnerability |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:35.openssl.asc[FreeBSD-SA-16:35.openssl] |2 November 2016 |Remote Denial of Service vulnerability |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:36.telnetd.asc[FreeBSD-SA-16:36.telnetd] |6 December 2016 |Possible http://www.FreeBSD.org/cgi/man.cgi?query=login&sektion=1&manpath=freebsd-release-ports[login(1)] argument injection |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:37.libc.asc[FreeBSD-SA-16:37.libc] |6 December 2016 |http://www.FreeBSD.org/cgi/man.cgi?query=link_ntoa&sektion=3&manpath=freebsd-release-ports[link_ntoa(3)] buffer overflow |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:38.bhyve.asc[FreeBSD-SA-16:38.bhyve] |6 December 2016 |Possible escape from http://www.FreeBSD.org/cgi/man.cgi?query=bhyve&sektion=8&manpath=freebsd-release-ports[bhyve(8)] virtual machine |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:39.ntp.asc[FreeBSD-SA-16:39.ntp] |22 December 2016 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-17:01.openssh.asc[FreeBSD-SA-17:01.openssh] |10 January 2017 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-17:02.openssl.asc[FreeBSD-SA-17:02.openssl] |23 February 2017 |Fix OpenSSL RC4_MD5 cipher vulnerability |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-17:03.ntp.asc[FreeBSD-SA-17:03.ntp] |12 April 2017 |Multiple vulnerabilities |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-17:04.ipfilter.asc[FreeBSD-SA-17:04.ipfilter] |27 April 2017 |Fix fragment handling panic |https://www.FreeBSD.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc[FreeBSD-SA-17:05.heimdal] |12 July 2017 |Fix KDC-REP service name validation vulnerability |=== [[errata]] == Errata Notices [width="100%",cols="40%,30%,30%",options="header",] |=== |Errata |Date |Topic |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:06.libc.asc[FreeBSD-EN-16:06.libc] |4 May 2016 |Performance regression in libc http://www.FreeBSD.org/cgi/man.cgi?query=hash&sektion=3&manpath=freebsd-release-ports[hash(3)] |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:07.ipi.asc[FreeBSD-EN-16:07.ipi] |4 May 2016 |Excessive latency in x86 IPI delivery |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:08.zfs.asc[FreeBSD-EN-16:08.zfs] |4 May 2016 |Memory leak in ZFS |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:09.freebsd-update.asc[FreeBSD-EN-16:09.freebsd-update] |25 July 2016 |Fix http://www.FreeBSD.org/cgi/man.cgi?query=freebsd-update&sektion=8&manpath=freebsd-release-ports[freebsd-update(8)] support of FreeBSD 11.0-RELEASE |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:10.dhclient.asc[FreeBSD-EN-16:10.dhclient] |11 August 2016 |Better handle unknown options received from aDHCP server |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:11.vmbus.asc[FreeBSD-EN-16:11.vmbus] |11 August 2016 |Avoid using spin locks for channel message locks |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:12.hv_storvsc.asc[FreeBSD-EN-16:12.hv_storvsc] |11 August 2016 |Enable INQUIRY result check only on Windows 10 host systems |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:13.vmbus.asc[FreeBSD-EN-16:13.vmbus] |11 August 2016 |Register time counter early enough for TSC freq calibration |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:14.hv_storvsc.asc[FreeBSD-EN-16:14.hv_storvsc] |11 August 2016 |Disable incorrect callout in http://www.FreeBSD.org/cgi/man.cgi?query=hv_storvsc&sektion=4&manpath=freebsd-release-ports[hv_storvsc(4)] |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:15.vmbus.asc[FreeBSD-EN-16:15.vmbus] |11 August 2016 |Better handle the GPADL setup failure in Hyper-V |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:16.hv_storvsc.asc[FreeBSD-EN-16:16.hv_storvsc] |11 August 2016 |Fix SCSI INQUIRY checks and error handling |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:17.vm.asc[FreeBSD-EN-16:17.vm] |25 October 2016 |Several virtual memory issues |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:19.tzcode.asc[FreeBSD-EN-16:19.tzcode] |6 December 2016 |Fix warnings about invalid timezone abbreviations |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-16:20.tzdata.asc[FreeBSD-EN-16:20.tzdata] |6 December 2016 |Update timezone database information |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-17:05.xen.asc[FreeBSD-EN-17:05.xen] |23 February 2017 |Xen migration enhancements |https://www.FreeBSD.org/security/advisories/FreeBSD-EN-17:06.hyperv.asc[FreeBSD-EN-17:06.hyperv] |12 July 2017 |Boot compatibility improvements with Azure virtual machines |=== [[open-issues]] == Open Issues * FreeBSD/i386 10.3-RELEASE running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a specific version of VirtualBox or host operating system. + It has been reported that instability may be present on virtual machines running on other hypervisors, such as Xen or KVM. + It causes various errors and makes FreeBSD quite unstable. Although the cause is still unclear, disabling unmapped I/O works as a workaround. To disable it, choose `Escape to loader prompt` in the boot menu and enter the following lines from http://www.FreeBSD.org/cgi/man.cgi?query=loader&sektion=8&manpath=freebsd-release-ports[loader(8)] prompt, after an `OK`: + [.screen] ---- set vfs.unmapped_buf_allowed=0 boot ---- + Note that the following line has to be added to `/boot/loader.conf` after a boot. It disables unmapped I/O at every boot: + [.screen] ---- vfs.unmapped_buf_allowed=0 ---- * FreeBSD/i386 10.3-RELEASE installed on ZFS may crash during boot when the ZFS pool mount is attempted while booting an unmodified `GENERIC` kernel. + As described in `/usr/src/UPDATING` entry `20121223`, rebuilding the kernel with `options KSTACK_PAGES=4` has been observed to resolve the boot-time crash. This, however, is not an ideal solution for inclusion in the `GENERIC` kernel configuration, as increasing `KSTACK_PAGES` implicitly decreases available usermode threads in an environment that is already resource-starved. + Taking into account the heavy resource requirements of ZFS, in addition to the i386-specific tuning requirements for general workloads, using ZFS with the FreeBSD/i386 `GENERIC` kernel is strongly discouraged. + If installing FreeBSD/i386 on ZFS, it is possible to configure the system after installation to increase the `KSTACK_PAGES`. + When prompted by http://www.FreeBSD.org/cgi/man.cgi?query=bsdinstall&sektion=8&manpath=freebsd-release-ports[bsdinstall(8)] to perform additional post-installation configuration to the system, select [.guibutton]#[ YES ]#. + This procedure requires the system sources available locally. If the `System source code` distribution was not selected during installation, it can be obtained using svnlite: + [.screen] ---- # mkdir -p /usr/src # svnlite co svn://svn.freebsd.org/base/releng/10.2 /usr/src ---- + Build the `kernel-toolchain` required to rebuild the kernel: + [.screen] ---- # make -C /usr/src kernel-toolchain ---- + Next, create a kernel configuration file to increase the `KSTACK_PAGES` option: + [.screen] ---- # printf "include GENERIC\noptions KSTACK_PAGES=4\n" > /usr/src/sys/i386/conf/ZFS ---- + Then build and install the _`ZFS`_ kernel: + [.screen] ---- # make -C /usr/src buildkernel KERNCONF=ZFS # make -C /usr/src installkernel KERNCONF=ZFS ---- + [.warning] *Warning*: + It is extremely important to take note that, by default, http://www.FreeBSD.org/cgi/man.cgi?query=freebsd-update&sektion=8&manpath=freebsd-release-ports[freebsd-update(8)] will install the `GENERIC` kernel configuration, and as such, http://www.FreeBSD.org/cgi/man.cgi?query=freebsd-update&sektion=8&manpath=freebsd-release-ports[freebsd-update(8)] consumers are strongly encouraged to avoid FreeBSD-provided kernel binary upgrades with such configurations. * Due to an incompatibility between http://www.FreeBSD.org/cgi/man.cgi?query=bsdconfig&sektion=8&manpath=freebsd-release-ports[bsdconfig(8)] and http://www.FreeBSD.org/cgi/man.cgi?query=pkg&sektion=8&manpath=freebsd-release-ports[pkg(8)], packages included on the FreeBSD dvd installer will not be recognized by http://www.FreeBSD.org/cgi/man.cgi?query=bsdconfig&sektion=8&manpath=freebsd-release-ports[bsdconfig(8)]. + To install packages from the `dvd1.iso` installer, create the `/dist` target directory, and manually mount the `dvd1.iso` ISO: + [.screen] ---- # mkdir -p /dist # mount -t cd9660 /dev/cd0 /dist ---- + [.note] *Note*: + Be sure to use the correct `/dev` device path for the `dvd1.iso` ISO installer. + Next, set `REPOS_DIR` to the path of the `repos/` directory within the installer so http://www.FreeBSD.org/cgi/man.cgi?query=pkg&sektion=8&manpath=freebsd-release-ports[pkg(8)] will use the correct repository metadata. + If using http://www.FreeBSD.org/cgi/man.cgi?query=sh&sektion=1&manpath=freebsd-release-ports[sh(1)]: + [.screen] ---- # export REPOS_DIR=/dist/packages/repos ---- + If using http://www.FreeBSD.org/cgi/man.cgi?query=csh&sektion=1&manpath=freebsd-release-ports[csh(1)]: + [.screen] ---- # setenv REPOS_DIR /dist/packages/repos ---- + [.note] *Note*: + Keep in mind that `REPOS_DIR` will need to be set again after the current shell session is terminated, if continuing to use the packages provided on the `dvd1.iso` installer. + Finally, bootstrap http://www.FreeBSD.org/cgi/man.cgi?query=pkg&sektion=8&manpath=freebsd-release-ports[pkg(8)] from the ISO, and install required packages: + [.screen] ---- # pkg bootstrap # pkg install xorg-server xorg gnome3 [...] ---- * An issue was discovered where the http://www.FreeBSD.org/cgi/man.cgi?query=netstat&sektion=1&manpath=freebsd-release-ports[netstat(1)] `-s` option will cause a segmentation fault on systems with `IPSEC` compiled into the kernel. The issue was resolved in the `stable/10` branch, and an Errata Notice is planned after 10.3-RELEASE is released. + [2015-08-19] Resolved as FreeBSD-EN-15:12. * An issue was discovered that causes http://www.FreeBSD.org/cgi/man.cgi?query=make&sektion=1&manpath=freebsd-release-ports[make(1)] to generate noisy output when doing source-based upgrades from FreeBSD 9.3 and earlier. The issue was reported in PR 202277, and after investigation and determining the issue does not cause source-based upgrades to fail, a post-release Errata Notice is planned. + [2015-08-19] Resolved as FreeBSD-EN-15:11. * An issue with FreeBSD virtual machines with vagrant was discovered that affects the VirtualBox where the virtual machine will not start on the initial boot invoked with `vagrant up`. + The issue is due to the virtual machine MAC being unset, as FreeBSD does not provide a default `Vagrantfile`. + It has been observed, however, that a subsequent invocation of `vagrant up` will allow the virtual machine to successfully boot, allowing access via `vagrant ssh`. * [2015-08-16] An error was discovered in the release notes for FreeBSD 10.3-RELEASE regarding the `drm` device driver. The entry for r282199 states the driver was updated to match the version Linux(R) 3.8.13 version, however the entry should have noted the change affects device-independent code, and does not bring the `drm` driver fully in line with the stated Linux(R) version. [[late-news]] == Late-Breaking News No news.