From owner-svn-doc-all@freebsd.org Tue Jul 25 13:44:35 2017 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 29FEFC7CEBD; Tue, 25 Jul 2017 13:44:35 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E96657C2B0; Tue, 25 Jul 2017 13:44:34 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id v6PDiYMb005524; Tue, 25 Jul 2017 13:44:34 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id v6PDiYtu005523; Tue, 25 Jul 2017 13:44:34 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201707251344.v6PDiYtu005523@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 25 Jul 2017 13:44:34 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r50559 - head/en_US.ISO8859-1/htdocs/releases/11.1R X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/11.1R X-SVN-Commit-Revision: 50559 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 25 Jul 2017 13:44:35 -0000 Author: gjb Date: Tue Jul 25 13:44:34 2017 New Revision: 50559 URL: https://svnweb.freebsd.org/changeset/doc/50559 Log: Regen after r321474. Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/11.1R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/11.1R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.1R/errata.html Tue Jul 25 13:19:12 2017 (r50558) +++ head/en_US.ISO8859-1/htdocs/releases/11.1R/errata.html Tue Jul 25 13:44:34 2017 (r50559) @@ -1,5 +1,5 @@ -FreeBSD 11.1-RELEASE Errata

FreeBSD 11.1-RELEASE Errata

The FreeBSD Project

FreeBSD 11.1-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered @@ -13,7 +13,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2017-07-20 19:57:01 EDT by gjb.
Abstract

This document lists errata items for FreeBSD 11.1-RELEASE, + ® symbol.

Last modified on 2017-07-25 09:43:15 EDT by gjb.
Abstract

This document lists errata items for FreeBSD 11.1-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information @@ -34,25 +34,14 @@ errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 11.1-STABLE also contain up-to-date copies of this document (as of the time of - the snapshot).

For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.

2. Security Advisories

AdvisoryDateTopic
FreeBSD-SA-16:32.bhyve25 October 2016

Privilege escalation vulnerability

FreeBSD-SA-16:33.openssh2 November 2016

Remote Denial of Service - vulnerability

FreeBSD-SA-16:36.telnetd6 December 2016

Possible login(1) argument - injection

FreeBSD-SA-16:37.libc6 December 2016

link_ntoa(3) buffer overflow

FreeBSD-SA-16:38.bhyve6 December 2016

Possible escape from bhyve(8) virtual - machine

FreeBSD-SA-16:39.ntp22 December 2016

Multiple vulnerabilities

FreeBSD-SA-17:01.openssh10 January 2017

Multiple vulnerabilities

FreeBSD-SA-17:02.openssl23 February 2017

Multiple vulnerabilities

FreeBSD-SA-17:03.ntp12 April 2017

Multiple vulnerabilities

FreeBSD-SA-17:04.ipfilter27 April 2017

Fix fragment handling panic

FreeBSD-SA-17:05.heimdal12 July 2017

Fix KDC-REP service name validation - vulnerability

3. Errata Notices

ErrataDateTopic
FreeBSD-EN-16:18.loader25 October 2016

Loader may hang during boot

FreeBSD-EN-16:19.tzcode6 December 2016

Fix warnings about invalid timez one - abbreviations

FreeBSD-EN-16:20.tzdata6 December 2016

Update timezone database - information

FreeBSD-EN-16:21.localedef6 December 2016

Fix incorrectly defined unicode - characters

FreeBSD-EN-17:01.pcie23 February 2017

Fix system hang when booting when PCI-express - HotPlug is enabled

FreeBSD-EN-17:02.yp23 February 2017

Fix NIS master updates are not pushed to an NIS - slave

FreeBSD-EN-17:03.hyperv23 February 2017

Fix compatibility with Hyper-V/storage after - KB3172614 or KB3179574

FreeBSD-EN-17:04.mandoc23 February 2017

Make makewhatis(1) output - reproducible

FreeBSD-EN-17:05.xen23 February 2017

Xen migration enhancements

4. Open Issues

2. Security Advisories

AdvisoryDateTopic
No advisories  

3. Errata Notices

ErrataDateTopic
No notices  

4. Open Issues

  • FreeBSD/i386 installed on ZFS may crash during boot when the ZFS pool mount is attempted while booting an unmodified GENERIC kernel.

    A system tunable has been added as of revision r286584 to make the kern.kstack_pages tunable configurable without recompiling the kernel.

    To mitigate system crashes with such configurations, - chose Escape to loader prompt in the boot - menu and enter the following lines from loader(8) + choose Escape to loader prompt in the + boot menu and enter the following lines from loader(8) prompt, after an OK:

    set kern.kstack_pages=4
     boot

    Add this line to /boot/loader.conf for the change to