FreeBSD 9.3-RELEASE Release Notes
The release notes for FreeBSD 9.3-RELEASE contain a summary of the changes made to the FreeBSD base system on the 9.3-STABLE development line. This document lists applicable security advisories that were issued since the last release, as well as significant changes to the FreeBSD kernel and userland. Some brief remarks on upgrading are also presented.
Table of Contents
This document contains the release notes for FreeBSD 9.3-RELEASE. It describes recently added, changed, or deleted features of FreeBSD. It also provides some notes on upgrading from previous versions of FreeBSD.
This distribution of FreeBSD 9.3-RELEASE is a release
distribution. It can be found at
http://www.FreeBSD.org/releases/ or any of its
mirrors. More information on obtaining this (or other) release
distributions of FreeBSD can be found in the "Obtaining
FreeBSD" appendix to the FreeBSD
All users are encouraged to consult the release errata before installing FreeBSD. The errata document is updated with "late-breaking" information discovered late in the release cycle or after the release. Typically, it contains information on known bugs, security advisories, and corrections to documentation. An up-to-date copy of the errata for FreeBSD 9.3-RELEASE can be found on the FreeBSD Web site.
This section describes the most user-visible new or changed features in FreeBSD since 9.2-RELEASE.
Typical release note items document recent security advisories issued after 9.2-RELEASE, new drivers or hardware support, new commands or options, major bug fixes, or contributed software upgrades. They may also list changes to major ports/packages or release engineering practices. Clearly the release notes cannot list every single change made to FreeBSD between releases; this document focuses primarily on security advisories, user-visible changes, and major architectural improvements.
Problems described in the following security advisories have
been fixed. For more information, consult the individual advisories
14 January 2014
Fix bsnmpd(1) remote denial of service vulnerability
14 January 2014
Disable "monitor" feature in ntpd(8) by default
14 January 2014
Remote denial of service vulnerability
8 April 2014
Deadlock in the NFS server
8 April 2014
ECDSA side channel leak
30 April 2014
TCP reassembly vulnerability
26 May 2014
Sendmail improper close-on-exec flag handling
3 June 2014
ktrace(1) kernel memory disclosure
3 June 2014
Incorrect error handling in PAM policy parser
5 June 2014
24 June 2014
8 July 2014
Kernel memory disclosure in control messages and SCTP notifications
A kernel panic triggered in
zfs_root() after a
failed rollback has been fixed.
kern.disallow_high_osrel, has been
added which disables executing the images compiled on a userland
with a higher major version number than the major version number of
the running kernel.
r257126 (Sponsored by The FreeBSD Foundation)
A deadlock triggered by powering off a USB device has been fixed. r257373
A kernel panic when listing sysctls on a system with
INVARIANTS enabled has been fixed.
A kernel panic triggered by some multi-threaded applications has been fixed. r260082 (Sponsored by The FreeBSD Foundation)
kern.panic_reboot_wait_time, has been
added. This allows tuning the amount of time the system will wait
before rebooting after
defaults to the kernel configuration option,
Hardware Random Number Generators have been disabled by default. r260644
A memory leak of compressed buffers has been fixed in
Support for the ext4 filesystem has been enabled, supporting read-only mounts. r262564
A kernel panic triggered by inserting a USB ethernet device on VIMAGE-enabled systems has been fixed. r262594
TTM, a memory manager used by video drivers, has been merged. r262988 (Sponsored by The FreeBSD Foundation)
A memory leak in the
zpool_in_use() function has
A memory leak has been fixed in
Trackpad support for Apple® MacBook products has been added. r261510
The Radeon KMS driver has been added. r263170,263171
Network Interface Support
nmbcluster values to their current value
will now be ignored, instead of failing with an error.
/var/cache directory is now created with mode
0755 instead of mode
0750, since this
directory is used by many third-party applications, which makes
dropping group privileges impossible.
A byte-order bug in the Heimdal
function which would prevent interoperability with other Kerberos
implementations has been fixed. In particular, this would prevent
interoperability with the MIT implementation.
hw.uart.console is now always updated when the
comconsole setup changes.
A bug that could trigger an infinite loop in KDE and X has been fixed. r261674
Installation from a read-only
.OBJDIR has been
A new shared library directory,
has been added for internal-use shared libraries.
libmap32.conf has been added, for 32-bit
libucl library, a JSON-compatible configuration
file parsing library, has been imported.
The system timezone data files have been updated to version tzdata2014a. r263042
sh(1) command interpreter has been updated to expand
readonly differently. As result of this change,
variable assignment such as
local v=$1 will assign the
first positional parameter to
v, even if
$1 contains spaces, and
will expand the tilde (
find(1) utility has been updated to implement
-ignore_readdir_race. Prior to this change,
-ignore_readdir_race existed as an option for GNU
find(1) compatibility, and was ignored if specified. A counter
-noignore_readdir_race now also exists, and
is the default behavior.
ps(1) utility has been updated to include the
flag, used to filter output by matching
ail(8) IDs and names. Additionally, argument
be used to
-J to only list processes running on the
A new flag, "onifconsole" has been added to
/etc/ttys. This allows the system to provide a login
prompt via serial console if the device is an active kernel
console, otherwise it is equivalent to
Sendmail has been updated to version 8.14.9. r266711
BIND has been updated to version 9.9.5. r262706 (Sponsored by DK Hostmaster A/S)
OpenSSH has been updated to version 6.6p1. r263970
OpenSSL has been updated to version 0.9.8za. r267285
Ports and Packages
Note to FreeBSD desktop users: please read this section carefully, especially before upgrading ports that depend on Xorg.
In April 2014, the FreeBSD Ports collection switched to a newer version of Xorg that supports KMS (Kernel Mode Setting).
Users upgrading from earlier versions of FreeBSD 9.x or FreeBSD 8.x should be aware of several things regarding Xorg:
When applications are built from the FreeBSD Ports Collection or installed from the
new_xorgpkg(8) repository, the newer, KMS-aware version of Xorg is used.
The KMS version of Xorg does not switch back to text mode after leaving the X desktop environment, and the system console will not be visible. The new vt(4) console driver supports graphic consoles and keeps the console visible after X has exited. The vt(4) driver must be compiled into the kernel. A
VTkernel configuration example file is included in 9.3-RELEASE, but is not compiled or enabled by default. See vt(4) and the vt(4) wiki page for additional information.
Packages for KDE4 are not available in the default (
latest) pkg(8) repository, however are available in the
new_xorgrepository. See the announcement email for details on how to use the
The older Xorg that does not support KMS can still be installed from the
latestupstream pkg(8) repository and the packages included on the 9.3-RELEASE DVD.
However, it is important to note that some newer applications require the newer Xorg, and will not work with the old version. The newer [Xorg is recommended, and should be used unless not compatible with legacy graphics cards.
To continue using the old version of Xorg when building from the FreeBSD Ports Collection, set
Release Engineering and Integration
Upgrading from Previous Releases of FreeBSD
Upgrading Using freebsd-update(8) or a Source-Based Procedure
[amd64,i386] Binary upgrades between RELEASE versions (and
snapshots of the various security branches) are supported using the
freebsd-update(8) utility. The binary upgrade procedure will
update unmodified userland utilities, as well as an unmodified
GENERIC kernel, distributed as a part of an official
FreeBSD release. The
freebsd-update(8) utility requires that the host being upgraded
have Internet connectivity.
Source-based upgrades (those based on recompiling the FreeBSD
base system from source code) from previous versions are supported
using to the instructions in
For more specific information about upgrading instructions, see FreeBSD 9.3-RELEASE Installation Instructions.
Upgrading FreeBSD should only be attempted after backing up all data and configuration files.
FreeBSD 9.0 and later versions have several configuration incompatibilities with earlier versions of FreeBSD. These differences are best understood before upgrading. Please read this section and the Upgrading Section in 9.0-RELEASE Release Notes carefully before submitting a problem report and/or posting a question to the FreeBSD mailing lists.