article.xml revision 111435
1<!-- 
2	FreeBSD errata document.  Unlike some of the other RELNOTESng
3	files, this file should remain as a single SGML file, so that
4	the dollar FreeBSD dollar header has a meaningful modification
5	time.  This file is all but useless without a datestamp on it,
6	so we'll take some extra care to make sure it has one.
7
8	(If we didn't do this, then the file with the datestamp might
9	not be the one that received the last change in the document.)
10
11-->
12
13<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN" [
14<!ENTITY % man PUBLIC "-//FreeBSD//ENTITIES DocBook Manual Page Entities//EN">
15%man;
16<!ENTITY % authors PUBLIC  "-//FreeBSD//ENTITIES DocBook Author Entities//EN">
17%authors;
18<!ENTITY % mlists PUBLIC "-//FreeBSD//ENTITIES DocBook Mailing List Entities//EN">
19%mlists;
20<!ENTITY % release PUBLIC "-//FreeBSD//ENTITIES Release Specification//EN">
21%release;
22]>
23
24<article>
25  <articleinfo>
26    <title>&os;
27<![ %release.type.snapshot [
28    &release.prev;
29]]>
30<![ %release.type.release [
31    &release.current;
32]]>
33    Errata</title>
34
35    <corpauthor>
36    The &os; Project
37    </corpauthor>
38
39    <pubdate>$FreeBSD: head/release/doc/en_US.ISO8859-1/errata/article.sgml 111435 2003-02-24 17:50:27Z bmah $</pubdate>
40
41    <copyright>
42      <year>2000</year>
43      <year>2001</year>
44      <year>2002</year>
45      <year>2003</year>
46      <holder role="mailto:doc@FreeBSD.org">The FreeBSD Documentation Project</holder>
47    </copyright>
48  </articleinfo>
49
50  <abstract>
51    <para>This document lists errata items for &os; 
52<![ %release.type.snapshot [
53      &release.prev;,
54]]>
55<![ %release.type.release [
56      &release.current;,
57]]>
58      containing significant information discovered after the release.
59      This information includes security advisories, as well as news
60      relating to the software or documentation that could affect its
61      operation or usability.  An up-to-date version of this document
62      should always be consulted before installing this version of
63      &os;.</para>
64
65    <para>This errata document for &os; 
66<![ %release.type.snapshot [
67      &release.prev;
68]]>
69<![ %release.type.release [
70      &release.current;
71]]>
72      will be maintained until the release of &os; 5.1-RELEASE.</para>
73  </abstract>
74
75  <sect1 id="intro">
76    <title>Introduction</title>
77
78    <para>This errata document contains <quote>late-breaking news</quote>
79      about &os;
80<![ %release.type.snapshot [
81      &release.prev;.
82]]>
83<![ %release.type.release [
84      &release.current;.
85]]>
86      Before installing this version, it is important to consult this
87      document to learn about any post-release discoveries or problems
88      that may already have been found and fixed.</para>
89
90    <para>Any version of this errata document actually distributed
91      with the release (for example, on a CDROM distribution) will be
92      out of date by definition, but other copies are kept updated on
93      the Internet and should be consulted as the <quote>current
94      errata</quote> for this release.  These other copies of the
95      errata are located at <ulink
96      url="http://www.FreeBSD.org/releases/"></ulink>, plus any sites
97      which keep up-to-date mirrors of this location.</para>
98
99    <para>Source and binary snapshots of &os; &release.branch; also
100      contain up-to-date copies of this document (as of the time of
101      the snapshot).</para>
102
103    <para>For a list of all &os; CERT security advisories, see <ulink
104      url="http://www.FreeBSD.org/security/"></ulink> or <ulink
105      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/"></ulink>.</para>
106
107  </sect1>
108
109  <sect1 id="security">
110    <title>Security Advisories</title>
111
112    <para>Remotely exploitable vulnerabilities in
113      <application>CVS</application> could allow an attacker to
114      execute arbitrary comands on a CVS server.  More details can be
115      found in security advisory <ulink
116      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:01.cvs.asc">FreeBSD-SA-03:01</ulink>.</para>
117
118    <para>A timing-based attack on <application>OpenSSL</application>,
119      could allow a very powerful attacker access to plaintext
120      under certain circumstances.  This problem has been corrected in
121      &os; &release.current; with an upgrade
122      to <application>OpenSSL</application> 0.9.7.  On supported
123      security fix branches, this problem has been corrected with the
124      import of <application>OpenSSL</application> 0.9.6i.  See security
125      advisory <ulink
126      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:02.openssl.asc">FreeBSD-SA-03:02</ulink>
127      for more details.</para>
128
129    <para>It may be possible to recover the shared secret key used by
130      the implementation of the <quote>syncookies</quote> feature.
131      This reduces its effectiveness in dealing with TCP SYN flood
132      denial-of-service attacks.  Workaround information and fixes are
133      given in security advisory <ulink
134      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:03.syncookies.asc">FreeBSD-SA-03:03</ulink>.</para>
135
136  </sect1>
137
138  <sect1 id="late-news">
139    <title>Late-Breaking News</title>
140
141    <bridgehead renderas="sect3">GEOM</bridgehead>
142
143    <para>The &man.geom.4;-based disk partitioning code in the kernel
144      will not allow an open partition to be overwritten.  This
145      usually prevents the use of <command>disklabel -B</command> to
146      update the boot blocks on a disk because the
147      <literal>a</literal> partition overlaps the space where the boot
148      blocks are stored.  A suggested workaround is to boot from an
149      alternate disk, a CDROM, or a fixit floppy.</para>
150
151    <bridgehead renderas="sect3">&man.dump.8;</bridgehead>
152
153    <para>When using disk media with sector sizes larger than 512
154      bytes (for instance, &man.gbde.4; encrypted disks), the
155      &man.dump.8; program fails to respect the larger sector size and
156      cannot dump the partition.  One possible workaround is to copy
157      the entire file system in raw format and dump the copy.  It is,
158      for instance, possible to dump a file system stored in a regular
159      file:</para>
160
161      <screen>&prompt.root; <userinput>dd if=/dev/ad0s1d.bde of=/junk/ad0.dd bs=1m</userinput>
162&prompt.root; <userinput>dump 0f - /junk/ad0.dd | ...</userinput></screen>
163
164    <para>A simpler workaround is to use &man.tar.1; or &man.cpio.1;
165      to make backup copies.</para>
166
167    <bridgehead renderas="sect3">&man.mly.4;</bridgehead>
168
169    <para>Hangs were reported during &os; 5.0 snapshot
170      installations when installing to &man.mly.4;-supported RAID
171      arrays, in hardware configurations that appear to work fine
172      under &os; 4.7-RELEASE.  These problems have been corrected
173      in &os; &release.current;.</para>
174
175    <bridgehead renderas="sect3">NETNCP/Netware File System
176      Support</bridgehead>
177
178    <para>NETNCP and nwfs appear to be as-yet unadapted for KSE, and
179      hence not working.</para>
180
181    <bridgehead renderas="sect3">&man.iir.4; controller</bridgehead>
182
183    <para>During installation, the &man.iir.4; controller appears to
184      probe correctly, but finds no disk devices.</para>
185
186    <bridgehead renderas="sect3">&man.truss.1; race condition</bridgehead>
187
188    <para>&man.truss.1; appears to contain a race condition during the
189      start-up of debugging, which can result in &man.truss.1; failing
190      to attach to the process before it exists.  The symptom is that
191      &man.truss.1; reports that it cannot open the &man.procfs.5;
192      node supporting the process being debugged.  A bug also appears
193      to exist wherein &man.truss.1; will hang if &man.execve.2;
194      returns <literal>ENOENT</literal> A further race appears to
195      exist in which &man.truss.1; will return <errorname>PIOCWAIT:
196      Input/output error</errorname> occasionally on startup.  The fix
197      for this sufficiently changes process execution handling that it
198      has been deferred until after 5.0.</para>
199
200    <bridgehead renderas="sect3">Disk Partitioning in Installer</bridgehead>
201
202    <para>Some bugs have been reported in &man.sysinstall.8; disk
203      partitioning.  One observed problem on the i386 is that
204      &man.sysinstall.8; cannot recalculate the free space left on a
205      disk after changing the type of an FDISK-type partition.</para>
206
207    <bridgehead renderas="sect3">Stale Documentation</bridgehead>
208
209    <para>In some case, documentation (such as the FAQ or Handbook)
210      has not been updated to take into account &os; &release.prev;
211      features.  Examples of areas where documentation is still
212      needed include &man.gbde.8; and the new <quote>fast
213      IPsec</quote> implementation.</para>
214
215    <bridgehead renderas="sect3">SMB File System</bridgehead>
216
217    <para>Attempting to unmount smbfs shares may fail with
218      <errorname>Device busy</errorname> errors even when the
219      mount-point is not really busy.  A workaround is to keep trying
220      to unmount the share until it eventually succeeds.  This bug has
221      been fixed in &release.current;.</para>
222
223    <para>Forcefully unmounting (<command>umount -f</command>) smbfs
224      shares may cause a kernel panic.  This bug has been fixed in
225      &release.current;.</para>
226
227    <bridgehead renderas="sect3">&man.fstat.2;</bridgehead>
228
229    <para>When called on a connected socket file descriptor,
230      &man.fstat.2; is supposed to return the number of bytes
231      available to read in the <varname>st_size</varname> member of
232      <varname>struct stat</varname>. However,
233      <varname>st_size</varname> is always erroneously reported as
234      <literal>0</literal> on TCP sockets.  This bug has been fixed in
235      &release.current;.</para>
236
237    <bridgehead renderas="sect3">Kernel Event Queues</bridgehead>
238
239    <para>The &man.kqueue.2; <literal>EVFILT_READ</literal> filter
240      erroneously indicates that <literal>0</literal> bytes are
241      available to be read on TCP sockets, regardless of the number of
242      bytes that are actually available. The
243      <literal>NOTE_LOWAT</literal> flag for
244      <literal>EVFILT_READ</literal> is also broken on TCP sockets.
245      This bug has been fixed in &release.current;.</para>
246
247    <bridgehead renderas="sect3">POSIX Named Semaphores</bridgehead>
248
249    <para>&os; &release.prev; introduced support for POSIX named semaphores
250      but the implementation contains a critical bug that causes
251      &man.sem.open.3; to incorrectly handle the opening of the same
252      semaphore multiple times by the same process, and that causes
253      &man.sem.close.3; to crash calling programs.  This bug has been
254      fixed in &release.current;.</para>
255
256    <bridgehead renderas="sect3"><filename>/dev/tty</filename>
257      Permissions</bridgehead>
258
259    <para>&os; &release.prev; has a minor bug in how the permissions of
260      <filename>/dev/tty</filename> are handled.  This can be
261      triggered by logging in as a non-<username>root</username>,
262      non-<groupname>tty</groupname> group user, and using &man.su.1;
263      to switch to a second non-<username>root</username>,
264      non-<groupname>tty</groupname> group user.  &man.ssh.1; will
265      fail because it cannot open <filename>/dev/tty</filename>.  This
266      bug has been fixed in &release.current;.</para>
267
268    <bridgehead renderas="sect3">&man.growfs.8;</bridgehead>
269
270    <para>&man.growfs.8; no longer works on &man.vinum.4; volumes (and
271      presumably, on &man.geom.4; entities) since these subsystems no
272      longer fake disklabels, but &man.growfs.8; insists on examining
273      a label.</para>
274
275    <bridgehead renderas="sect3">IPFW</bridgehead>
276
277    <para>&man.ipfw.4; <literal>skipto</literal> rules do not work
278      when coupled with the <literal>log</literal> keyword.  This bug
279      has been fixed in &release.current;.</para>
280
281    <bridgehead renderas="sect3">Passwords and &man.adduser.8;</bridgehead>
282
283    <para>&man.adduser.8; does not correctly handle setting user
284      passwords containing special shell characters.  This problem has
285      been corrected in &release.current;.</para>
286
287    <bridgehead renderas="sect3">&man.xl.4;</bridgehead>
288
289    <para>The &man.xl.4; driver has a timing bug that may cause a
290      kernel panic (or other problems) when attempting to configure an
291      interface.  This bug has been fixed in &release.current;.</para>
292
293    <bridgehead renderas="sect3">ISC DHCP</bridgehead>
294
295    <para><application>ISC DHCP</application> was updated to
296      3.0.1rc11.  This update was actually a part of &os;
297      &release.prev;, but was not documented in the release
298      notes.</para>
299
300    <bridgehead renderas="sect3">&man.amd.8;
301      Interoperability</bridgehead>
302
303    <para>&release.prev; contains some bugs in its non-blocking RPC
304      code.  The most noticeable side-effect of these bugs was that
305      &man.amd.8; users were not able to mount volumes from a
306      &release.prev; server.  This bug has been fixed in
307      &release.current;.</para>
308
309  </sect1>
310</article>
311