FreeBSD 12.1-RELEASE Release Notes
Abstract
The release notes for FreeBSD 12.1-RELEASE contain a summary of the changes made to the FreeBSD base system on the 12-STABLE development line. This document lists applicable security advisories that were issued since the last release, as well as significant changes to the FreeBSD kernel and userland. Some brief remarks on upgrading are also presented.
Table of Contents
Introduction
This document contains the release notes for FreeBSD RELEASE.CURRENT. It describes recently added, changed, or deleted features of FreeBSD. It also provides some notes on upgrading from previous versions of FreeBSD.
The RELEASE.TYPE distribution to which these release notes apply represents the latest point along the RELEASE.BRANCH development branch since RELEASE.BRANCH was created. Information regarding pre-built, binary RELEASE.TYPE distributions along this branch can be found at .
The RELEASE.TYPE distribution to which these release notes apply represents a point along the RELEASE.BRANCH development branch between RELEASE.PREV and the future RELEASE.NEXT. Information regarding pre-built, binary RELEASE.TYPE distributions along this branch can be found at .
This distribution of FreeBSD RELEASE.CURRENT is a RELEASE.TYPE distribution. It can be found at or any of its mirrors. More information on obtaining this (or other) RELEASE.TYPE distributions of FreeBSD can be found in the Obtaining FreeBSD' appendix to the FreeBSD Handbook.
All users are encouraged to consult the release errata before installing FreeBSD. The errata document is updated with "late-breaking" information discovered late in the release cycle or after the release. Typically, it contains information on known bugs, security advisories, and corrections to documentation. An up-to-date copy of the errata for FreeBSD RELEASE.CURRENT can be found on the FreeBSD Web site.
This document describes the most user-visible new or changed features in FreeBSD since RELEASE.PREV. In general, changes described here are unique to the RELEASE.BRANCH branch unless specifically marked as MERGED features.
Typical release note items document recent security advisories issued after RELEASE.PREV, new drivers or hardware support, new commands or options, major bug fixes, or contributed software upgrades. They may also list changes to major ports/packages or release engineering practices. Clearly the release notes cannot list every single change made to FreeBSD between releases; this document focuses primarily on security advisories, user-visible changes, and major architectural improvements.
Upgrading from Previous Releases of FreeBSD
Binary upgrades between RELEASE versions (and snapshots of the various security branches) are supported using the freebsd-update(8) utility. The binary upgrade procedure will update unmodified userland utilities, as well as unmodified GENERIC kernels distributed as a part of an official FreeBSD release. The freebsd-update(8) utility requires that the host being upgraded have Internet connectivity.
Source-based upgrades (those based on recompiling the FreeBSD
base system from source code) from previous versions are supported,
according to the instructions in
/usr/src/UPDATING
.
Important
|
Upgrading FreeBSD should only be attempted after backing up all data and configuration files. |
Security and Errata
This section lists the various Security Advisories and Errata Notices since RELEASE.PREV.
Security Advisories
Advisory | Date | Topic |
---|---|---|
19 December 2018 |
Buffer overflow |
|
5 February 2019 |
Kernel data register leak |
|
5 February 2019 |
File description reference count leak |
|
14 May 2019 |
Multiple vulnerabilities |
|
14 May 2019 |
Authenticated denial of service in ntpd(8) |
|
14 May 2019 |
IPv6 fragment reassembly panic in pf(4) |
|
14 May 2019 |
ICMP/ICMP6 packet filter bypass in pf(4) |
|
14 May 2019 |
Microarchitectural Data Sampling |
|
19 June 2019 |
Resource exhaustion in non-default RACK TCP stack |
|
2 July 2019 |
iconv(3) buffer overflow |
|
2 July 2019 |
Kernel stack disclosure |
|
2 July 2019 |
Privilege escalation in cd(4) |
|
24 July 2019 |
Multiple vulnerabilities |
|
24 July 2019 |
Write-after-free vulnerability |
|
24 July 2019 |
Reference count overflow |
|
24 July 2019 |
xhci(4) out-of-bounds read |
|
24 July 2019 |
Reference count leak |
|
6 August 2019 |
Multiple vulnerabilities |
|
6 August 2019 |
Out-of-bounds memory access |
|
6 August 2019 |
Insufficient message length validation |
|
6 August 2019 |
Insufficient validation of guest-supplied data |
|
20 August 2019 |
IPv6 remove denial-of-service |
|
20 August 2019 |
Kernel memory disclosure |
|
20 August 2019 |
Reference count overflow |
Errata Notices
Errata | Date | Topic |
---|---|---|
9 January 2019 |
Connection stalls with CUBIC congestion control |
|
9 January 2019 |
TCP connections may stall and eventually fail in case of packet loss |
|
9 January 2019 |
sqlite update |
|
9 January 2019 |
Timezone database information update |
|
5 February 2019 |
DTrace incompatibility with SMAP-enabled systems |
|
5 February 2019 |
LLE table lookup code race condition |
|
14 May 2019 |
Timezone database information update |
|
14 May 2019 |
install(1) broken with partially matching relative paths |
|
14 May 2019 |
Insufficient filename validation in scp(1) client |
|
19 June 2019 |
Incorrect locking in networking stack |
|
2 July 2019 |
Timezone database information update |
|
24 July 2019 |
System crash from Intel CPU vulnerability mitigation |
|
6 August 2019 |
Incorrect locking |
|
6 August 2019 |
Incorrect exception handling |
|
20 August 2019 |
Instruction emulation improvements |
|
20 August 2019 |
"jail" keyword fix |
Userland
This section covers changes and additions to userland applications, contributed software, and system utilities.
Userland Configuration Changes
The gcc -Werror
flag has been turned off by
default.
[r352094]
Userland Application Changes
The
lockf(1) utility has been updated to return
EX_UNAVAILABLE
if the -n
flag is used and
the lock file does not exist.
[r345569]
The
ktrdump(8) utility has been updated to include the
-l
flag which enables "live" mode when specified.
[r342705]
The trim(8) utility has been added, which deletes content for blocks on flash-based storage devices that use wear-leveling algorithms. [r344688]
The
sh(1) utility has been updated to include a new
pipefail
option, which when set, changes the exit
status of a pipeline to the last non-zero exit status of any
command in the pipeline.
[r345487]
The mlx5tool(8) utility has been updated to implement firmware update capability for ConnectX-4®, ConnectX-5®, and ConnectX-6®. [r347752] (Sponsored by Mellanox Technologies)
The posixshmcontrol(1) utility has been added. [r348426]
The
swapon(8) utility has been updated to invoke
BIO_DELETE
to trim swap devices if either the
-E
flag is used on the command line, or if the
trimonce
option is included in
fstab(5) .
[r349930]
The
nvmecontrol(8) utility has been updated to add a new
subcommand, resv
, which is used to handle NVMe
reservations.
[r350952]
The
camcontrol(8) utility has been updated to support block
descriptors when using the modepage
subcommand.
[r351530] (Sponsored by
iXsystems)
The
freebsd-update(8) utility has been updated to include two new
commands, updatesready
and showconfig
.
[r352774]
Contributed Software
BearSSL has been imported to the base system. [r343281]
The
tcpdump(1) utility has been updated to disable
capsicum(4) support when the -E
flag is used.
[r346986]
The libarchive(3) library has been updated to version 3.4.0. [r349523]
The clang, llvm, lld, lldb, compiler-rt utilities and libc++ have been updated to version 8.0.1. [r350256]
The lld linker has been enabled by default for i386. [r350297] (Sponsored by The FreeBSD Foundation)
The bzip2recover utility has been added. [r350634]
Warnings have been added for Kerberos GSS algorithms deprecated in RFC8221 and RFC8429. [r351243]
The WPA utilities have been updated to version 2.9. [r351611]
OpenSSL has been updated to version 1.1.1d. [r352192]
The timezone database files have been updated to version 2019c. [r352353]
Deprecated Applications
Runtime Libraries and API
The libomp
library has been added.
Kernel
This section covers changes to kernel configurations, system tuning, and system control parameters that are not otherwise categorized.
Devices and Drivers
This section covers changes and additions to devices and device drivers since RELEASE.PREV.
Device Drivers
The ichwd(4) driver has been updated to include support for TCO watchdog timers in the Lewisburg PCH (C620) chipset. [r340190] (Sponsored by Panzura)
The amdsmn(4) and amdtemp(4) drivers have been updated to support Ryzen™ 2 host bridges. [r340446]
The amdtemp(4) driver has been updated to correct temperature reporting for the AMD® 2990WX. [r340447]
The rtwn_pci(4) driver has been added for the RTL8188EE chipset. [r342835]
The ntb_hw_amd(4) driver has been added, providing support for the AMD® Non-Transparent Bridge. [r351536]
The cdceem(4) driver has been added, supporting virtual USB network cards provided by iLO 5, found in new HPE® Proliant™ servers. [r351942] (Sponsored by Hewlett Packard Enterprise)
Storage
This section covers changes and additions to file systems and other storage subsystems, both local and networked.
General Storage
The camcontrol(8) utility has been updated to add ATA power mode support. [r347384] (Sponsored by Multiplay)
Boot Loader Changes
This section covers the boot loader, boot menu, and other boot-related changes.
Boot Loader Changes
The
loader(8) has been update to allow booting from ZFS datasets
with the large_dnode
feature flag enabled.
[r342683]
The
loader(8) has been updated to support the
com.delphix:removing
ZFS
zpool-features(7) flag.
[r351384]
Networking
This section describes changes that affect networking in FreeBSD.
General Network
The
ipfw(8) utility has been updated to fix showing headers outside
of "all" when executing ipfw table list
.
[r344667]
Support for NAT64 CLAT has been added, as defined in RFC6877. [r346200] (Sponsored by Yandex LLC)
The net.inet.tcp.rexmit_initial
sysctl(8) has been added, used for setting
RTO.Initial
, used by TCP.
[r347110] (Sponsored by
Netflix)
Support for GRE-in-UDP encapsulation has been added, as defined in RFC8086. [r348233]
Ports Collection and Package Infrastructure
This section covers changes to the FreeBSD Ports Collection, package infrastructure, and package maintenance and installation tools.
Packaging Changes
The pkg(8) utility has been updated to version 1.12.0.
The GNOME desktop environment has been updated to version 3.28.
The KDE desktop environment has been updated to version 5.16.5.19.08.1.
General Notes Regarding Future FreeBSD Releases
Default CPUTYPE
Change
Starting with FreeBSD-13.0, the default CPUTYPE
for
the i386 architecture will change from 486
to
686
.
This means that, by default, binaries produced will require a 686-class CPU, including but not limited to binaries provided by the FreeBSD Release Engineering team. FreeBSD 13.0 will continue to support older CPUs, however users needing this functionality will need to build their own releases for official support.
As the primary use for i486 and i586 CPUs is generally in the embedded market, the general end-user impact is expected to be minimal, as new hardware with these CPU types has long faded, and much of the deployed base of such systems is nearing retirement age, statistically.
There were several factors taken into account for this change. For example, i486 does not have 64-bit atomics, and while they can be emulated in the kernel, they cannot be emulated in the userland. Additionally, the 32-bit amd64 libraries have been i686 since their inception.
As the majority of 32-bit testing is done by developers using
the lib32 libraries on 64-bit hardware with the
COMPAT_FREEBSD32
option in the kernel, this change
ensures better coverage and user experience. This also aligns with
what the majority of Linux® distributions have been doing for quite
some time.
This is expected to be the final bump of the default
CPUTYPE
in i386.
Important
|
This change does not affect the FreeBSD 12.x series of releases. |
Last modified on: March 27, 2023 by Daniel Ebdrup Jensen