Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 18 Sep 2017 15:17:07 +0000 (UTC)
From:      Glen Barber <gjb@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-10@freebsd.org
Subject:   svn commit: r323708 - in stable/10/release/doc: en_US.ISO8859-1/errata share/xml
Message-ID:  <201709181517.v8IFH7Ij001797@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: gjb
Date: Mon Sep 18 15:17:07 2017
New Revision: 323708
URL: https://svnweb.freebsd.org/changeset/base/323708

Log:
  - Prune stale entries from 10.3-RELEASE.
  - Prune entries from errata.xml and security.xml.
  - Update versions to reflect 10.4-RELEASE.
  
  Sponsored by:	The FreeBSD Foundation

Modified:
  stable/10/release/doc/en_US.ISO8859-1/errata/article.xml
  stable/10/release/doc/share/xml/errata.xml
  stable/10/release/doc/share/xml/release.ent
  stable/10/release/doc/share/xml/security.xml

Modified: stable/10/release/doc/en_US.ISO8859-1/errata/article.xml
==============================================================================
--- stable/10/release/doc/en_US.ISO8859-1/errata/article.xml	Mon Sep 18 15:17:01 2017	(r323707)
+++ stable/10/release/doc/en_US.ISO8859-1/errata/article.xml	Mon Sep 18 15:17:07 2017	(r323708)
@@ -46,7 +46,8 @@
 	&os;.</para>
 
       <para>This errata document for &os; &release.prev; will be
-	maintained until the release of &os; &release.next;.</para>
+	maintained until &os; &release.prev; reaches
+	end-of-life.</para>
     </abstract>
   </info>
 
@@ -236,28 +237,6 @@ boot</screen>
       </listitem>
 
       <listitem>
-	<para>An issue was discovered where the &man.netstat.1;
-	  <literal>-s</literal> option will cause a segmentation fault
-	  on systems with <literal>IPSEC</literal> compiled into the
-	  kernel.  The issue was resolved in the
-	  <literal>stable/10</literal> branch, and an Errata Notice is
-	  planned after &release.prev; is released.</para>
-
-	<para>[2015-08-19] Resolved as FreeBSD-EN-15:12.</para>
-      </listitem>
-
-      <listitem>
-	<para>An issue was discovered that causes &man.make.1; to
-	  generate noisy output when doing source-based upgrades from
-	  &os; 9.3 and earlier.  The issue was reported in PR 202277,
-	  and after investigation and determining the issue does not
-	  cause source-based upgrades to fail, a post-release Errata
-	  Notice is planned.</para>
-
-	<para>[2015-08-19] Resolved as FreeBSD-EN-15:11.</para>
-      </listitem>
-
-      <listitem>
 	<para>An issue with &os; virtual machines with
 	  <application>vagrant</application> was discovered that
 	  affects the <application>VirtualBox</application> where the
@@ -272,17 +251,6 @@ boot</screen>
 	  invocation of <literal>vagrant up</literal> will allow the
 	  virtual machine to successfully boot, allowing access via
 	  <literal>vagrant ssh</literal>.</para>
-      </listitem>
-
-      <listitem>
-	<para>[2015-08-16] An error was discovered in the release
-	  notes for &os; &release.prev; regarding the
-	  <literal>drm</literal> device driver.  The entry for r282199
-	  states the driver was updated to match the version &linux;
-	  3.8.13 version, however the entry should have noted the
-	  change affects device-independent code, and does not bring
-	  the <literal>drm</literal> driver fully in line with the
-	  stated &linux; version.</para>
       </listitem>
     </itemizedlist>
   </sect1>

Modified: stable/10/release/doc/share/xml/errata.xml
==============================================================================
--- stable/10/release/doc/share/xml/errata.xml	Mon Sep 18 15:17:01 2017	(r323707)
+++ stable/10/release/doc/share/xml/errata.xml	Mon Sep 18 15:17:07 2017	(r323708)
@@ -19,128 +19,9 @@
 
     <tbody>
       <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:06.libc.asc">FreeBSD-EN-16:06.libc</link></entry>
-	<entry>4&nbsp;May&nbsp;2016</entry>
-	<entry><para>Performance regression in libc
-	    &man.hash.3;</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:07.ipi.asc">FreeBSD-EN-16:07.ipi</link></entry>
-	<entry>4&nbsp;May&nbsp;2016</entry>
-	<entry><para>Excessive latency in x86 IPI
-	    delivery</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:08.zfs.asc">FreeBSD-EN-16:08.zfs</link></entry>
-	<entry>4&nbsp;May&nbsp;2016</entry>
-	<entry><para>Memory leak in ZFS</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:09.freebsd-update.asc">FreeBSD-EN-16:09.freebsd-update</link></entry>
-	<entry>25&nbsp;July&nbsp;2016</entry>
-	<entry><para>Fix &man.freebsd-update.8; support of
-	    &os;&nbsp;11.0-RELEASE</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:10.dhclient.asc">FreeBSD-EN-16:10.dhclient</link></entry>
-	<entry>11&nbsp;August&nbsp;2016</entry>
-	<entry><para>Better handle unknown options received from
-	    aDHCP server</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:11.vmbus.asc">FreeBSD-EN-16:11.vmbus</link></entry>
-	<entry>11&nbsp;August&nbsp;2016</entry>
-	<entry><para>Avoid using spin locks for channel message
-	    locks</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:12.hv_storvsc.asc">FreeBSD-EN-16:12.hv_storvsc</link></entry>
-	<entry>11&nbsp;August&nbsp;2016</entry>
-	<entry><para>Enable INQUIRY result check only on
-	    Windows&nbsp;10 host systems</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:13.vmbus.asc">FreeBSD-EN-16:13.vmbus</link></entry>
-	<entry>11&nbsp;August&nbsp;2016</entry>
-	<entry><para>Register time counter early enough for TSC freq
-	    calibration</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:14.hv_storvsc.asc">FreeBSD-EN-16:14.hv_storvsc</link></entry>
-	<entry>11&nbsp;August&nbsp;2016</entry>
-	<entry><para>Disable incorrect callout in
-	    &man.hv.storvsc.4;</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:15.vmbus.asc">FreeBSD-EN-16:15.vmbus</link></entry>
-	<entry>11&nbsp;August&nbsp;2016</entry>
-	<entry><para>Better handle the GPADL setup failure in
-	    Hyper-V</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:16.hv_storvsc.asc">FreeBSD-EN-16:16.hv_storvsc</link></entry>
-	<entry>11&nbsp;August&nbsp;2016</entry>
-	<entry><para>Fix SCSI INQUIRY checks and error
-	    handling</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:17.vm.asc">FreeBSD-EN-16:17.vm</link></entry>
-	<entry>25&nbsp;October&nbsp;2016</entry>
-	<entry><para>Several virtual memory issues</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:19.tzcode.asc">FreeBSD-EN-16:19.tzcode</link></entry>
-	<entry>6&nbsp;December&nbsp;2016</entry>
-	<entry><para>Fix warnings about invalid timezone
-	    abbreviations</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:20.tzdata.asc">FreeBSD-EN-16:20.tzdata</link></entry>
-	<entry>6&nbsp;December&nbsp;2016</entry>
-	<entry><para>Update timezone database
-	    information</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-17:05.xen.asc">FreeBSD-EN-17:05.xen</link></entry>
-	<entry>23&nbsp;February&nbsp;2017</entry>
-	<entry><para>Xen migration enhancements</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-17:06.hyperv.asc">FreeBSD-EN-17:06.hyperv</link></entry>
-	<entry>12&nbsp;July&nbsp;2017</entry>
-	<entry><para>Boot compatibility improvements with
-	    Azure virtual machines</para></entry>
+	<entry><para>No notices.</para></entry>
+	<entry><para>&nbsp;</para></entry>
+	<entry><para>&nbsp;</para></entry>
       </row>
     </tbody>
   </tgroup>

Modified: stable/10/release/doc/share/xml/release.ent
==============================================================================
--- stable/10/release/doc/share/xml/release.ent	Mon Sep 18 15:17:01 2017	(r323707)
+++ stable/10/release/doc/share/xml/release.ent	Mon Sep 18 15:17:07 2017	(r323708)
@@ -6,23 +6,23 @@
 
 <!-- Version of the OS we're describing.  This needs to be updated
      with each new release. -->
-<!ENTITY release.current "10.3-STABLE">
+<!ENTITY release.current "10.4-STABLE">
 
 <!-- The previous version used for comparison in the "What's New"
      section.  For -CURRENT, we might point back to the last
      branchpoint. -->
-<!ENTITY release.prev "10.3-RELEASE">
+<!ENTITY release.prev "10.4-RELEASE">
 
 <!-- The previous stable release, useful for pointing user's at the
      release they SHOULD be running if they don't want the bleeding
      edge. -->
-<!ENTITY release.prev.stable "10.2-RELEASE">
+<!ENTITY release.prev.stable "10.3-RELEASE">
 
 <!-- The next version to be released, usually used for snapshots. -->
-<!ENTITY release.next "10.3-RELEASE">
+<!ENTITY release.next "10.4-STABLE">
 
 <!-- The name of this branch. -->
-<!ENTITY release.branch "10.3-STABLE">
+<!ENTITY release.branch "10.4-STABLE">
 
 <!-- The URL for obtaining this version of FreeBSD. -->
 <!ENTITY release.url "https://www.FreeBSD.org/snapshots/">;
@@ -38,8 +38,8 @@
 <!-- WARNING: Do not forget to also change the release type in
      doc.relnotes.mk when updating this -->
 <!ENTITY release.type "snapshot">
-<!ENTITY % release.type.current  "INCLUDE">
-<!ENTITY % release.type.snapshot "IGNORE">
+<!ENTITY % release.type.current  "IGNORE">
+<!ENTITY % release.type.snapshot "INCLUDE">
 <!ENTITY % release.type.release "IGNORE">
 
 <![%release.type.current;[

Modified: stable/10/release/doc/share/xml/security.xml
==============================================================================
--- stable/10/release/doc/share/xml/security.xml	Mon Sep 18 15:17:01 2017	(r323707)
+++ stable/10/release/doc/share/xml/security.xml	Mon Sep 18 15:17:07 2017	(r323708)
@@ -19,200 +19,9 @@
 
     <tbody>
       <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:09.ntp.asc">FreeBSD-SA-16:09.ntp</link></entry>
-	<entry>29&nbsp;April&nbsp;2016</entry>
-	<entry><para>Multiple <application>ntp</application>
-	    vulnerabilities.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:17.openssl.asc">FreeBSD-SA-16:17.openssl</link></entry>
-	<entry>29&nbsp;April&nbsp;2016</entry>
-	<entry><para>Multiple <application>OpenSSL</application>
-	    vulnerabilities.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:18.atkbd.asc">FreeBSD-SA-16:18.atkbd</link></entry>
-	<entry>17&nbsp;May&nbsp;2016</entry>
-	<entry><para>Keyboard driver buffer overflow</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:19.sendmsg.asc">FreeBSD-SA-16:19.sendmsg</link></entry>
-	<entry>17&nbsp;May&nbsp;2016</entry>
-	<entry><para>Incorrect argument handling in
-	    &man.sendmsg.2;</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:20.linux.asc">FreeBSD-SA-16:20.linux</link></entry>
-	<entry>31&nbsp;May&nbsp;2016</entry>
-	<entry><para>Kernel stack disclosure in Linux compatibility
-	  layer</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:21.43bsd.asc">FreeBSD-SA-16:21.43bsd</link></entry>
-	<entry>31&nbsp;May&nbsp;2016</entry>
-	<entry><para>Kernel stack disclosure in 4.3BSD compatibility
-	  layer</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:22.libarchive.asc">FreeBSD-SA-16:22.libarchive</link></entry>
-	<entry>31&nbsp;May&nbsp;2016</entry>
-	<entry><para>Absolute path traversal
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:23.libarchive.asc">FreeBSD-SA-16:23.libarchive</link></entry>
-	<entry>31&nbsp;May&nbsp;2016</entry>
-	<entry><para>Absolute path traversal
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:24.ntp.asc">FreeBSD-SA-16:24.ntp</link></entry>
-	<entry>3&nbsp;June&nbsp;2016</entry>
-	<entry><para>Multiple <application>ntp</application>
-	    vulnerabilties</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:25.bspatch.asc">FreeBSD-SA-16:25.bspatch</link></entry>
-	<entry>25&nbsp;July&nbsp;2016</entry>
-	<entry><para>heap overflow vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:26.openssl.asc">FreeBSD-SA-16:26.openssl</link></entry>
-	<entry>23&nbsp;September&nbsp;2016</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:27.openssl.asc">FreeBSD-SA-16:27.openssl</link></entry>
-	<entry>26&nbsp;September&nbsp;2016</entry>
-	<entry><para>Regression in <application>OpenSSL</application>
-	    suite</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:29.bspatch.asc">FreeBSD-SA-16:29.bspatch</link></entry>
-	<entry>10&nbsp;October&nbsp;2016</entry>
-	<entry><para>Heap overflow vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:30.portsnap.asc">FreeBSD-SA-16:30.portsnap</link></entry>
-	<entry>10&nbsp;October&nbsp;2016</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:31.libarchive.asc">FreeBSD-SA-16:31.libarchive</link></entry>
-	<entry>10&nbsp;October&nbsp;2016</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:33.openssh.asc">FreeBSD-SA-16:33.openssh</link></entry>
-	<entry>2&nbsp;November&nbsp;2016</entry>
-	<entry><para>Remote Denial of Service
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:35.openssl.asc">FreeBSD-SA-16:35.openssl</link></entry>
-	<entry>2&nbsp;November&nbsp;2016</entry>
-	<entry><para>Remote Denial of Service
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:36.telnetd.asc">FreeBSD-SA-16:36.telnetd</link></entry>
-	<entry>6&nbsp;December&nbsp;2016</entry>
-	<entry><para>Possible &man.login.1; argument
-	    injection</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:37.libc.asc">FreeBSD-SA-16:37.libc</link></entry>
-	<entry>6&nbsp;December&nbsp;2016</entry>
-	<entry><para>&man.link.ntoa.3; buffer overflow</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:38.bhyve.asc">FreeBSD-SA-16:38.bhyve</link></entry>
-	<entry>6&nbsp;December&nbsp;2016</entry>
-	<entry><para>Possible escape from &man.bhyve.8; virtual
-	  machine</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:39.ntp.asc">FreeBSD-SA-16:39.ntp</link></entry>
-	<entry>22&nbsp;December&nbsp;2016</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:01.openssh.asc">FreeBSD-SA-17:01.openssh</link></entry>
-	<entry>10&nbsp;January&nbsp;2017</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:02.openssl.asc">FreeBSD-SA-17:02.openssl</link></entry>
-	<entry>23&nbsp;February&nbsp;2017</entry>
-	<entry><para>Fix OpenSSL RC4_MD5 cipher
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:03.ntp.asc">FreeBSD-SA-17:03.ntp</link></entry>
-	<entry>12&nbsp;April&nbsp;2017</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:04.ipfilter.asc">FreeBSD-SA-17:04.ipfilter</link></entry>
-	<entry>27&nbsp;April&nbsp;2017</entry>
-	<entry><para>Fix fragment handling panic</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:05.heimdal.asc">FreeBSD-SA-17:05.heimdal</link></entry>
-	<entry>12&nbsp;July&nbsp;2017</entry>
-	<entry><para>Fix KDC-REP service name validation
-	    vulnerability</para></entry>
+	<entry><para>No advisories.</para></entry>
+	<entry><para>&nbsp;</para></entry>
+	<entry><para>&nbsp;</para></entry>
       </row>
     </tbody>
   </tgroup>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201709181517.v8IFH7Ij001797>