Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 14 Oct 2014 12:40:53 +0000 (UTC)
From:      Glen Barber <gjb@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-releng@freebsd.org
Subject:   svn commit: r273082 - in releng/10.1/release/doc: en_US.ISO8859-1/errata share/xml
Message-ID:  <201410141240.s9ECertF011637@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: gjb
Date: Tue Oct 14 12:40:52 2014
New Revision: 273082
URL: https://svnweb.freebsd.org/changeset/base/273082

Log:
  - Correct the FreeBSD release displayed on the 10.1-R errata
    page.
  - Trim stale errata items from 10.0-RELEASE, but keep the
    entry regarding FreeBSD/i386 on VirtualBox, as I am unsure
    if the underlying cause was identified and/or corrected.
  - Fix a few occurances of 'release.prev' macros that should
    be 'release.current'. [1]
  - Switch release.ent entities to reflect a release, and update
    versions where appropriate.
  
  Submitted by:	pluknet [1]
  Approved by:	re (implicit)
  Sponsored by:	The FreeBSD Foundation

Modified:
  releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml
  releng/10.1/release/doc/share/xml/release.ent

Modified: releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml
==============================================================================
--- releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml	Tue Oct 14 12:29:24 2014	(r273081)
+++ releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml	Tue Oct 14 12:40:52 2014	(r273082)
@@ -10,7 +10,7 @@
   xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0">
 
   <info>
-    <title>&os; &release.prev; Errata </title>
+    <title>&os; &release.current; Errata </title>
 
     <author><orgname>The &os; Project</orgname></author>
 
@@ -31,7 +31,7 @@
     </legalnotice>
 
     <abstract>
-      <para>This document lists errata items for &os; &release.prev;,
+      <para>This document lists errata items for &os; &release.current;,
 	containing significant information discovered after the
 	release or too late in the release cycle to be otherwise
 	included in the release documentation.  This information
@@ -41,7 +41,7 @@
 	always be consulted before installing this version of
 	&os;.</para>
 
-      <para>This errata document for &os; &release.prev; will be
+      <para>This errata document for &os; &release.current; will be
 	maintained until the release of &os; &release.next;.</para>
     </abstract>
   </info>
@@ -50,7 +50,7 @@
     <title>Introduction</title>
 
     <para>This errata document contains <quote>late-breaking
-	news</quote> about &os; &release.prev; Before installing this
+	news</quote> about &os; &release.current; before installing this
       version, it is important to consult this document to learn about
       any post-release discoveries or problems that may already have
       been found and fixed.</para>
@@ -91,148 +91,9 @@
 
 	<tbody>
 	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc"
-	      >SA-13:14.openssh</link></entry>
-
-	    <entry>19&nbsp;November&nbsp;2013</entry>
-
-	    <entry><para>OpenSSH AES-GCM memory corruption
-		vulnerability</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc"
-	      >SA-14:01.bsnmpd</link></entry>
-
-	    <entry>14&nbsp;January&nbsp;2014</entry>
-
-	    <entry><para>bsnmpd remote denial of service vulnerability</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc"
-	      >SA-14:02.ntpd</link></entry>
-
-	    <entry>14&nbsp;January&nbsp;2014</entry>
-
-	    <entry><para>ntpd distributed reflection Denial of Service vulnerability</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc"
-	      >SA-14:03.openssl</link></entry>
-
-	    <entry>14&nbsp;January&nbsp;2014</entry>
-
-	    <entry><para>OpenSSL multiple vulnerabilities</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc"
-	      >SA-14:04.bind</link></entry>
-
-	    <entry>14&nbsp;January&nbsp;2014</entry>
-
-	    <entry><para>BIND remote denial of service vulnerability</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:05.nfsserver.asc"
-	      >SA-14:05.nfsserver</link></entry>
-
-	    <entry>8&nbsp;April&nbsp;2014</entry>
-
-	    <entry><para>Deadlock in the NFS server</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc"
-	      >SA-14:06.openssl</link></entry>
-
-	    <entry>8&nbsp;April&nbsp;2014</entry>
-
-	    <entry><para>OpenSSL multiple vulnerabilities</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:07.devfs.asc">SA-14:07.devfs</link></entry>;
-	    <entry>30&nbsp;April&nbsp;2014</entry>
-	    <entry><para>Fix devfs rules not applied by default for
-		jails</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc">SA-14:08.tcp</link></entry>;
-	    <entry>30&nbsp;April&nbsp;2014</entry>
-	    <entry><para>Fix TCP reassembly
-		vulnerability</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:09.openssl.asc">SA-14:09.openssl</link></entry>;
-	    <entry>30&nbsp;April&nbsp;2014</entry>
-	    <entry><para>Fix OpenSSL use-after-free
-		vulnerability</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:10.openssl.asc">SA-14:10.openssl</link></entry>;
-	    <entry>15&nbsp;May&nbsp;2014</entry>
-	    <entry><para>Fix OpenSSL NULL pointer deference
-		vulnerability</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:11.sendmail.asc">SA-14:11.sendmail</link></entry>;
-	    <entry>3&nbsp;June&nbsp;2014</entry>
-	    <entry><para>Fix sendmail improper close-on-exec flag
-		handling</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:13.pam.asc">SA-14:13.pam</link></entry>;
-	    <entry>3&nbsp;June&nbsp;2014</entry>
-	    <entry><para>Fix incorrect error handling in PAM policy
-		parser</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc">SA-14:14.openssl</link></entry>;
-	    <entry>5&nbsp;June&nbsp;2014</entry>
-	    <entry><para>Multiple vulnerabilities</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc">SA-14:15.iconv</link></entry>;
-	    <entry>24&nbsp;June&nbsp;2014</entry>
-	    <entry><para>NULL pointer dereference and out-of-bounds
-		array access</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:16.file.asc">SA-14:16.file</link></entry>;
-	    <entry>24&nbsp;June&nbsp;2014</entry>
-	    <entry><para>Multiple vulnerabilities</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc">SA-14:17.kmem</link></entry>;
-	    <entry>8&nbsp;July&nbsp;2014</entry>
-	    <entry><para>Kernel memory disclosure in control messages
-		and SCTP notifications</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc">SA-14:18.openssl</link></entry>;
-	    <entry>9&nbsp;September&nbsp;2014</entry>
-	    <entry><para>Multiple vulnerabilities</para></entry>
-	  </row>
-
-	  <row>
-	    <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc">SA-14:19.tcp</link></entry>;
-	    <entry>16&nbsp;September&nbsp;2014</entry>
-	    <entry><para>Denial of Service in TCP packet
-		processing.</para></entry>
+	    <entry>No advisories.</entry>
+	    <entry>&nbsp;</entry>
+	    <entry>&nbsp;</entry>
 	  </row>
 	</tbody>
       </tgroup>
@@ -244,7 +105,7 @@
 
     <itemizedlist>
       <listitem>
-	<para>&os;/&arch.i386; &release.prev; running as a guest
+	<para>&os;/&arch.i386; &release.current; running as a guest
 	  operating system on <application>VirtualBox</application>
 	  can have a problem with disk I/O access.  It depends on some
 	  specific hardware configuration and does not depend on a
@@ -271,88 +132,6 @@ boot</screen>
 	  instability may be present on virtual machines running
 	  on other hypervisors, such as Xen or KVM.</para>
       </listitem>
-
-      <listitem>
-	<para>A bug in <application>Heimdal</application> (an
-	  implementation of <application>Kerberos</application>
-	  authentication in &os; base system) has been fixed.  It
-	  could cause an interoperability issue between
-	  <application>Heimdal</application> and the other
-	  implementations including <application>MIT
-	  Kerberos</application>.  However, due to this fix,
-	  <application>Heimdal</application> and some applications
-	  which depend on it in the previous &os; releases do not work
-	  with one in &release.prev; in certain cases.  Errata Notice
-	  for the supported releases to fix it will be
-	  released.</para>
-      </listitem>
-
-      <listitem>
-	<para>A bug in &man.killall.1; has been discovered.  It
-	  makes <userinput>killall -INT</userinput> to deliver
-	  <literal>SIGTERM</literal> rather than the desired
-	  <literal>SIGINT</literal>, and may cause blocking
-	  behavior for scripts that uses it, as <literal>-I</literal>
-	  means <quote>interactive</quote>.  A workaround of this
-	  would be to use <literal>-SIGINT</literal> instead.
-	  This bug has been fixed on &os;-CURRENT and will be fixed
-	  in &os; &release.current;.</para>
-      </listitem>
-
-      <listitem>
-	<para>The &man.bxe.4; driver can cause packet corruption when
-	  TSO (TCP Segmentation Offload) feature is enabled.  This
-	  feature is enabled by default and can be disabled by using a
-	  <option>-tso</option> parameter of &man.ifconfig.8;.  It can
-	  be specified in &man.rc.conf.5; like the following:</para>
-
-	<programlisting>ifconfig_bxe0="DHCP -tso"</programlisting>
-
-	<para>This bug has been fixed on &os;
-	  &release.current;.</para>
-      </listitem>
-
-      <listitem>
-	<para>Due to a minor incompatibility with &man.pkg.7; version
-	  <literal>1.2.x</literal>, &man.bsdconfig.8; will duplicate
-	  the list of available packages for installation.  This is
-	  due to the <literal>PACKAGESITE</literal> environment
-	  variable being set for backwards compatibility with older
-	  versions of &man.pkg.7;.  This affects generation of the
-	  available package list only, and does not affect the
-	  behavior when processing packages for installation.</para>
-      </listitem>
-
-      <listitem>
-	<para>A regression in &man.pw.8; does not remove a user from
-	  groups not specified in the provided group list when the
-	  <literal>-G</literal> flag is used.  This is expected to be
-	  corrected in &os;-CURRENT and &os; &release.current;.</para>
-      </listitem>
-
-      <listitem>
-	<para>&man.ipfw.8; <literal>fwd</literal> action can send
-	  packets to the correct interface with a wrong link-layer
-	  address when the route is updated.  This bug has been fixed
-	  on &os;-CURRENT and will be fixed in &os;
-	  &release.current;.</para>
-      </listitem>
-
-      <listitem>
-	<para>The &man.mount.udf.8; utility has a bug which prevents
-	  it from mounting any UDF file system.  This has been fixed
-	  in &os;-CURRENT and &os; &release.current;.</para>
-      </listitem>
-
-      <listitem>
-	<para>Updating LSI firmware on &man.mps.4; controllers with
-	  the <application>sas2flash</application> utility may cause
-	  the system to hang, or may cause the system to panic.  This
-	  is fixed in the <literal>stable/10</literal> branch with
-	  revisions <literal>r262553</literal> and
-	  <literal>r262575</literal>, and will be included in
-	  &os;&nbsp;10.1-RELEASE.</para>
-      </listitem>
     </itemizedlist>
   </sect1>
 

Modified: releng/10.1/release/doc/share/xml/release.ent
==============================================================================
--- releng/10.1/release/doc/share/xml/release.ent	Tue Oct 14 12:29:24 2014	(r273081)
+++ releng/10.1/release/doc/share/xml/release.ent	Tue Oct 14 12:40:52 2014	(r273082)
@@ -6,7 +6,7 @@
 
 <!-- Version of the OS we're describing.  This needs to be updated
      with each new release. -->
-<!ENTITY release.current "10.0-STABLE">
+<!ENTITY release.current "10.1-RELEASE">
 
 <!-- The previous version used for comparison in the "What's New"
      section.  For -CURRENT, we might point back to the last
@@ -16,16 +16,16 @@
 <!-- The previous stable release, useful for pointing user's at the
      release they SHOULD be running if they don't want the bleeding
      edge. -->
-<!ENTITY release.prev.stable "10.0-RELEASE">
+<!ENTITY release.prev.stable "9.3-RELEASE">
 
 <!-- The next version to be released, usually used for snapshots. -->
-<!ENTITY release.next "10.1-RELEASE">
+<!ENTITY release.next "10.2-RELEASE">
 
 <!-- The name of this branch. -->
-<!ENTITY release.branch "10.0-STABLE">
+<!ENTITY release.branch "10.1-STABLE">
 
 <!-- The URL for obtaining this version of FreeBSD. -->
-<!ENTITY release.url "http://www.FreeBSD.org/snapshots/">;
+<!ENTITY release.url "http://www.FreeBSD.org/releases/">;
 
 <!-- The recommended mailing list to track. -->
 <!ENTITY release.maillist "stable">
@@ -34,10 +34,10 @@
      or "release" -->
 <!-- WARNING: Do not forget to also change the release type in
      doc.relnotes.mk when updating this -->
-<!ENTITY release.type "snapshot">
-<!ENTITY % release.type.current  "INCLUDE">
+<!ENTITY release.type "release">
+<!ENTITY % release.type.current  "IGNORE">
 <!ENTITY % release.type.snapshot "IGNORE">
-<!ENTITY % release.type.release "IGNORE">
+<!ENTITY % release.type.release "INCLUDE">
 
 <![%release.type.current;[
 <!ENTITY release '&release.current;'>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410141240.s9ECertF011637>