2 What's New
- 2.1 Security Advisories
- 2.2 Kernel Changes
- 2.2.1 Boot Loader Changes
- 2.2.2 Hardware Support
- 2.2.2.1 Multimedia Support
- 2.2.2.2 Network Interface Support
- 2.2.3 Network Protocols
- 2.2.4 Disks and Storage
- 2.2.5 File Systems
- 2.3 Userland Changes
- 2.3.1 /etc/rc.d Scripts
- 2.4 Contributed Software
- 2.5 Ports/Packages Collection Infrastructure
- 2.6 Release Engineering and Integration
- 2.7 Documentation
2.1 Security Advisories
A bug in ypserv(8), which effectively disabled the /var/yp/securenets access control mechanism, has been corrected. More details are available in security advisory FreeBSD-SA-06:15.ypserv.
ypserv(8)の、/var/yp/securenets アクセス制御機構が無効となるバグを修正しました。詳細はセキュリティ勧告 FreeBSD-SA-06:15.ypserv にあります。
A bug in the smbfs file system, which could allow an attacker to escape out of chroot(2) environments on an smbfs mounted filesystem, has been fixed. For more details, see security advisory FreeBSD-SA-06:16.smbfs.
smbfsファイルシステムの、攻撃者がsmbfsによりマウントされているファイルシステムにおいてchroot(2)環境を越えることができるバグを修正しました。詳細は、セキュリティ勧告 FreeBSD-SA-06:16.smbfs を参照してください。
A potential denial of service problem in sendmail(8) caused by excessive recursion which leads to stack exhaustion when attempting delivery of a malformed MIME message, has been fixed. For more details, see security advisory FreeBSD-SA-06:17.sendmail.
sendmail(8)における...サービス妨害攻撃をうける可能性のある問題を修正しました。詳細はセキュリティ勧告 FreeBSD-SA-06:17.sendmail を参照してください。
A potential buffer overflow condition in sppp(4) has been corrected. For more details, see security advisory FreeBSD-SA-06:18.ppp.
sppp(4)におけるバッファオーバーフローとなる可能性を修正しました。詳細はセキュリティ勧告 FreeBSD-SA-06:18.ppp を参照してください。
An OpenSSL bug related to validation of PKCS#1 v1.5 signatures has been fixed. For more details, see security advisory FreeBSD-SA-06:19.openssl.
A potential denial of service attack against named(8) has been fixed. For more details, see security advisory FreeBSD-SA-06:20.bind.
Several programming errors have been fixed in gzip(1). They could have the effect of causing a crash or an infinite loop when decompressing files. More information can be found in security advisory FreeBSD-SA-06:21.gzip.
Several vulnerabilities have been fixed in OpenSSH. More details can be found in security advisory FreeBSD-SA-06:22.openssh.
Multiple errors in the OpenSSL crypto(3) library have been fixed. Potential effects are varied, and are documented in more detail in security advisory FreeBSD-SA-06:23.openssl.
A bug that could permit corrupt archives to cause an infinite loop in libarchive(3) and tar(1) has been fixed. More details are available in FreeBSD-SA-06:24.libarchive.
A bug that could allow users in the operator group to read parts of kernel memory has been corrected. For more details, consult security advisory FreeBSD-SA-06:25.kmem.
A bug in the jail startup script that could permit privilege escalation via a symlink attack has been fixed. More information is available in FreeBSD-SA-07:01.jail.
2.2 Kernel Changes
Security event auditing is now supported in the FreeBSD kernel, and is enabled by the AUDIT kernel configuration option. More information can be found in the audit(4) manual page.
FreeBSDカーネルはセキュリティイベント監査をサポートし、AUDITカーネル設定オプションにより有効となります。詳細はaudit(4)マニュアルページで確認できます。
Instead of including all of physical memory in a kernel crash dump, the kernel now defaults to dumping only pages that are actively mapped into kernel virtual memory. This functionality requires that the new debug.minidump sysctl variable be set to 1.
カーネルクラッシュダンプにすべての物理メモリを含む代わりに、カーネルは現在デフォルトでカーネル仮想メモリの実際に割り当てられているページのみをダンプします。この機能は新しい debug.minidump sysctl変数を1にする必要があります。
Several workarounds for bugs in the tty(4) layer have been added; these changes prevent a variety of observed kernel panics.
tty(4)レイヤーのバグに対する幾つかの回避策を加えました;これらの変更はさまざまなカーネルパニックを防ぎます。
A bug has been fixed in the statistics-keeping code in the kernel's UMA memory allocator. This caused a count of memory allocation failures (as shown by netstat -m) to increase erroneously.
カーネルのUMAメモリ割り当てにある統計保存コードのバグを修正しました。
FreeBSD now runs on the Xbox, whose architecture is nearly identical to the i386. For details of the latest development, see http://www.FreeBSD.org/platforms/xbox.html.
i386に近いアーキテクチャであるXboxでFreeBSDが動作します。最新の開発の詳細は http://www.FreeBSD.org/platforms/xbox.html をみてください。
2.2.1 Boot Loader Changes
A bug in the i386 boot loader, which could cause filesystem corruption if a nextboot.conf file was used and landed after cylinder 1023, has been fixed.
nextboot.confファイルが使用され、リンダ1023以降にある場合、ファイルシステムの破壊を引き起こす、i386ブートローダのバグを修正しました。
2.2.2 Hardware Support
The amdsmb(4) driver has been added. It provides support for the AMD-8111 SMBus 2.0 controller.
amdsmb(4)ドライバを加えました。これは AMD-8111 SMBus 2.0 コントローラをサポートします。
Support has been improved for so-called “legacy-free” hardware, in particular, i386 systems without AT-style keyboard controllers such as the Macbook Pro.
「レガシーフリー」ハードウエアと呼ばれる、(特に) ATスタイルキーボードコントローラを持たないMacbook Pro のようなi386システムのサポートが改善されました。
ipmi(4), an OpenIPMI compatible driver, has been added. OpenIPMI (Intelligent Platform Management Interface) is an open standard designed to enable remote monitoring and control of server, networking and telecommunication platforms.
ipmi(4) (OpenIPMIコンパチブルドライバ) を加えました。OpenIPMI (Intelligent Platform Management Interface) はサーバ、ネットワーク、通信の遠隔監視・制御を可能とするプラットフォームのオープンスタンダード設計です。
Support for the PadLock Security Co-processor in VIA C3, Eden, and C7 processors has been added to the crypto(9) subsystem. More information can be found in the padlock(4) manual page.
VIA C3, Eden, それとC7プロセッサのPadLockセキュリティコプロセッサのサポートを、crypto(9)サブシステムに加えました。詳細はpadlock(4)マニュアルページにあります。
The nfsmb(4) driver, which supports the NVIDIA nForce 2/3/4 SMBus 2.0 controller, has been added.
NVIDIA nForce 2/3/4 SMBus 2.0 コントローラをサポートするnfsmb(4)ドライバを加えました。
2.2.2.1 Multimedia Support
2.2.2.2 Network Interface Support
The ath(4) driver has been updated to HAL version 0.9.17.2.
ath(4)ドライバをHALバージョン0.9.17.2へアップデートしました。
The ath(4), ath_hal(4), and ath_rate_sample drivers have been included in the GENERIC kernel by default.
ath(4), ath_hal(4)とath_rate_sampleドライバを標準でGEGENERICカーネルに加えました。
Some improvements have been made to the bce(4) driver to improve its stability. One user-visible aspect of these changes is that transmit-side checksum offload involving IP fragments has been disabled, because it was not handled correctly by the hardware.
安定生向上のためbce(4)ドライバをいくらか改良しました。表面的な変更点は、ハードウェアが正しく扱えないため、IPフラグメントを伴う送信側のチェックサムオフロードを無効にしたことです。
The em(4) driver has been updated to version 6.2.9 from Intel. Among other changes, it adds support for a number of new adapters. Compiling the driver with the EM_FAST_INTR preprocesor symbol defined will enable optional “fast interrupt” processing. “Fast interrupt” processing, as implemented in this version of the driver, has been shown to yield significant performance improvements in some cases, but has been linked to stability issues in other cases.
em(4)ドライバがインテルにより6.2.9へ更新されました。特筆すべき変更点は、幾つかの新しいアダプタのサポートです。EM_FAST_INTRプリプロセッサシンボルを定義してコンパイルしたドライバはオプションの「fast interrupt」処理が有効になります。このバージョンのドライバに実装された、「fast interrupt」処理は幾つかの場合に大きなパフォーマンス改善をもたらすが、他の場面では安定性につながる。
A number of improvements and bugfixes have been made to the functionality of the iwi(4) driver. This driver now requires the firmware image in the net/iwi-firmware-kmod port/package; prior versions of this driver used the net/iwi-firmware port/package.
幾つかの改良とバグ修正をiwi(4)ドライバの機能に行ないました。このドライバは現在net/iwi-firmware-kmod port/packageのファームウェアイメージが必要です; このドライバの前のバージョンはnet/iwi-firmware port/packageを使用していました。
The my(4) driver now has altq(4) support.
my(4)ドライバはaltq(4)をサポートしました。
The nve(4) driver has been updated to version 1.0-0310 (23-Nov-2005). It also now has altq(4) support.
nve(4)ドライバはバージョン1.0-0310 (23-Nov-2005)へアップデートされています。また、altq(4)をサポートしました。
The sk(4) driver is now MPSAFE.
sk(4)ドライバがMPSAFEになりました。
The stge(4) driver has been added. It supports the Sundance/Tamarack TC9021 Gigabit Ethernet controller and was ported from NetBSD.
stge(4)ドライバを加えました。これはSundance/Tamarack TC9021 ギガバイトイーサネットコントローラをサポートしており、NetBSDから導入されました。
2.2.3 Network Protocols
Multiple copies of a packet received via different bpf(4) listeners now all have identical timestamps.
別々のbpf(4)使用者を経由して受信したパケットの複数コピーは現在すべて独立したタイムスタンプを持ちます。
The enc(4) IPsec filtering pseudo-device has been added. It allows firewall packages using the pfil(9) framework to examine (and filter) IPsec traffic before outbound encryption and after inbound decryption.
enc(4) IPsecフィルタリング仮想デバイスを加えました。これはpfil(9)フレームワークを用いたファイアウォールパッケージでIPsec通信を暗号化送出前と受信復号後に検査(とフィルタリング)する事を可能とします。
The sysctl variables net.inet.ip.portrange.reservedhigh and net.inet.ip.portrange.reservedlow can be used with IPv6 now.
sysctl変数 net.inet.ip.portrange.reservedhigh と net.inet.ip.portrange.reservedlow はIPv6において使用できます。
The IPFIREWALL_FORWARD_EXTENDED kernel option has been removed. This option was used to permit ipfw(4) to redirect packets with local destinations. This behavior is now always enabled when the IPFIREWALL_FORWARD kernel option is enabled.
The ipfw(4) packet filter now supports tag and untag rule keywords. When a packet matches a rule with the tag keyword, the numeric tag for the given number in the range from 0 to 65535 will be attached to the packet. The tag acts as an internal marker (it is not sent out over the wire) that can be used to identify these packets later on, for example, by using tagged rule option. For more details, see ipfw(8).
The ng_ether(4) Netgraph node no longer overwrites the MAC address of outgoing frames by default.
ng_ether(4) Netgraphノードはもうデフォルトで送出フレームのMACアドレスを上書きしません。
The ng_tag(4) Netgraph node has been added to support the manipulation of mbuf tags attached to data in the kernel.
Support for kqueue(2) operations has been added to the tun(4) driver.
FreeBSD 6.1-RELEASE contained a bug in the IPv6 implementation, which caused spurious error messages to be printed for point-to-point interfaces. This problem has been corrected.
IPv6 link-local addresses are now enabled only if ipv6_enable is set in rc.conf(5).
A bug that prevented carp(4) from working correctly in some IPv6 environments has been fixed.
2.2.4 Disks and Storage
The arcmsr(4) driver has been updated to version 1.20.00.13.
The ata(4) driver now supports USB mass storage class devices. To enable it, a line device atausb in the kernel configuration file or loading the atausb kernel module is needed. Note that this functionality cannot coexist with the umass(4) driver.
The ata(4) driver has been updated to reflect the version in FreeBSD CURRENT.
geli(8) is now able to perform data integrity verification (data authentication) of encrypted data stored on disk. Note that the encryption algorithm is now specified to the geli(8) control program using the -e option; the -a option is now used to specify the authentication algorithm.
The isp(4) driver has been updated to reflect the version in FreeBSD CURRENT.
2.2.5 File Systems
Several bugs related to locking have been fixed in devfs(5). These fixes prevent several observed deadlock conditions.
The linsysfs(5) pseudo-filesystem driver has been added. It provides a subset of the Linux sys filesystem, and is required for the correct operation of some Linux binaries (such as the LSI MegaRAID SAS utility).
A deadlock observed when both quotas and snapshots were in use on a file system on FreeBSD 6.1-RELEASE has been corrected.
A performance regression with NFS servers running FreeBSD 6.1-RELEASE, caused by a leak of the Giant kernel lock, has been fixed.
2.3 Userland Changes
The asf(8) utility has been revised and extended. Now it can operate via several interfaces including kvm(3), which supports not only live systems, but also kernel crash dumps.
The OpenBSM userland tools, including audit(8), auditd(8), auditreduce(1), and praudit(1), have been added.
The cp(1) utility now supports a -l option, which causes it to create hardlinks to the source files instead of copying them.
The csup(1) utility has been imported. This is an implementation of a CVSup-compatible client written in the C language. Note that it currently supports checkout mode only.
The dhclient(8) program now sends the host's name in DHCP requests if it is not specified in the configuration file.
The du(1) program now supports a -n flag, which causes it to ignore files and directories with the nodump flag set.
The find(1) program now supports -Btime and other related primaries, which can be used to create expressions based on a file's creation time.
The freebsd-update(8) utility, a tool for managing binary updates to the FreeBSD base system, has been added.
The fsdb(8) utility now supports changing the birth time of files on UFS2 file systems using the new btime command.
The fsdb(8) program now supports a findblk command, which finds the inode(s) owning a specific disk block.
The getent(1) utility has been imported from NetBSD. It retrieves and displays information from an administrative database (such as hosts) using the lookup order specified in nsswitch.conf(5).
The id(1) utility now supports a -A flag to print process audit properties, including the audit user id.
The iostat(8) utility now supports a -x flag (inspired by Solaris) to print extended disk statistics. If the new -z flag is also specified, no output is made for disks with no activity.
The jail(8) program now supports a -s option to specify a jail's securelevel.
The jexec(8) utility now supports -u and -U flags to specify username credentials under which a command should be executed.
The logger(1) utility now supports a -P, which specifies the port to which syslog messages should be sent.
The ls(1) utility now supports an -U flag to use the file creation time for sorting.
The mount(8) utility now supports a late keyword in fstab(5), along with a corresponding -l command-line option to specify that these “late” file systems should be mounted.
The ping(8) command now supports a -W option to specify the maximum time to wait for an echo reply.
The pkill(1) utility (also known as pgrep(1)) has been moved from /usr/bin to /bin so that it can be used by startup scripts. Symbolic links from its former location have been created for backward compatibliity.
An extensible implementation of printf(3), compatible with GLIBC, has been added to libc. It is only used if the environment variable USE_XPRINTF is defined, one of the extension functions is called, or the global variable __use_xprintf is set to a value greater than 0. Five extensions are currently supported: %H (hex dump), %T (time_t and time-related structures), %M (errno message), %Q (double-quoted, escaped string), %V ( strvis(3)-format string),
The DNS resolver library in FreeBSD's libc has been updated to that from BIND 9.3.3.
The tail(1) utility now supports a -q flag to suppress header lines when multiple files are specified.
The traceroute(8) program now supports a -D flag, which causes it to display the differences between the sent and received packets.
The traceroute(8) utility now supports a -e option, which sets a fixed destination port for probe packets. This can be useful for tracing behind packet-filtering firewalls.
traceroute(8) now decodes the complete set of ICMP unreachable messages in its output.
The compiler toolchain is now capable of generating executables for systems using the ARM processor.
2.3.1 /etc/rc.d Scripts
The auditd script for OpenBSM auditd(8) has been added.
A bug in the rc.d/jail startup script, which caused a number of problems for users attempting to use jails on FreeBSD 6.1-RELEASE, has been corrected.
2.4 Contributed Software
BIND has been updated from 9.3.1 to 9.3.3.
GCC has been updated from 3.4.4 to 3.4.6.
IPFilter has been updated from 4.1.8 to 4.1.13.
less has been updated from v381 to v394.
libpcap has been updated from 0.9.1 to 0.9.4.
lukemftpd has been updated from a snapshot from NetBSD as of 9 August 2004 to a snapshot from NetBSD as of 31 August 2006.
netcat has been updated from the version in a 4 February 2005 OpenBSD snapshot to the version included in OpenBSD 3.9.
OpenSSH has been updated from 4.2p1 to 4.5p1.
sendmail has been updated from 8.13.6 to 8.13.8.
tcpdump has been updated from 3.9.1 to 3.9.4.
The timezone database has been updated from the tzdata2005r release to the tzdata2006g release.
TrustedBSD OpenBSM, version 1.0 alpha 12, an implementation of the documented Sun Basic Security Module (BSM) Audit API and file format, as well as local extensions to support the Mac OS X and FreeBSD operating systems has been added. This also includes command line tools for audit trail reduction and conversion to text, as well as documentation of the commands, file format, and APIs. For this functionality, the AUDIT kernel option, /var/audit directory, and audit group have been added.
zlib has been updated from version 1.2.2 to version 1.2.3.
2.5 Ports/Packages Collection Infrastructure
pkg_add(1) now supports an -F flag to disable checking whether the same package is already installed or not.
2.6 Release Engineering and Integration
The sysinstall(8) utility now displays the running FreeBSD version in menu titles.
The sysinstall(8) program contained a bug that could prevent it from installing a kernel if no distribution was explicitly selected at install-time. This bug has now been fixed.
A bug in sysinstall(8) that sometimes prevented package installs from multiple CDROM volumes has been fixed.
A /media directory has been added to contain mount points for removable media such as CDROMs, floppy disks, USB drives, and so on.
The supported version of the GNOME desktop environment (x11/gnome2) has been updated from 2.12.3 to 2.16.1. As a part of this update, the default prefix for GNOME (and some related programs) has moved from /usr/X11R6 to /usr/local. This version of GNOME also adds support for the Hardware Abstraction Layer (HAL), which provides features such as auto-mounting removable media, auto-playing CDs, and more integrated power control.
The supported version of the KDE desktop environment (x11/kde3) has been updated from 3.5.1 to 3.5.4.
The supported Linux emulation now uses the libraries in the emulators/linux_base-fc4 package.
2.7 Documentation
The manual pages for NTP have been updated to 4.2.0, to match the version of code actually included in FreeBSD.
Documentation of existing functionality has been improved by the addition of the following manual pages: nanobsd(8), sysctl(9).