Date: Tue, 14 Oct 2014 12:40:53 +0000 (UTC) From: Glen Barber <gjb@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-releng@freebsd.org Subject: svn commit: r273082 - in releng/10.1/release/doc: en_US.ISO8859-1/errata share/xml Message-ID: <201410141240.s9ECertF011637@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: gjb Date: Tue Oct 14 12:40:52 2014 New Revision: 273082 URL: https://svnweb.freebsd.org/changeset/base/273082 Log: - Correct the FreeBSD release displayed on the 10.1-R errata page. - Trim stale errata items from 10.0-RELEASE, but keep the entry regarding FreeBSD/i386 on VirtualBox, as I am unsure if the underlying cause was identified and/or corrected. - Fix a few occurances of 'release.prev' macros that should be 'release.current'. [1] - Switch release.ent entities to reflect a release, and update versions where appropriate. Submitted by: pluknet [1] Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml releng/10.1/release/doc/share/xml/release.ent Modified: releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml ============================================================================== --- releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml Tue Oct 14 12:29:24 2014 (r273081) +++ releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml Tue Oct 14 12:40:52 2014 (r273082) @@ -10,7 +10,7 @@ xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0"> <info> - <title>&os; &release.prev; Errata </title> + <title>&os; &release.current; Errata </title> <author><orgname>The &os; Project</orgname></author> @@ -31,7 +31,7 @@ </legalnotice> <abstract> - <para>This document lists errata items for &os; &release.prev;, + <para>This document lists errata items for &os; &release.current;, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information @@ -41,7 +41,7 @@ always be consulted before installing this version of &os;.</para> - <para>This errata document for &os; &release.prev; will be + <para>This errata document for &os; &release.current; will be maintained until the release of &os; &release.next;.</para> </abstract> </info> @@ -50,7 +50,7 @@ <title>Introduction</title> <para>This errata document contains <quote>late-breaking - news</quote> about &os; &release.prev; Before installing this + news</quote> about &os; &release.current; before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.</para> @@ -91,148 +91,9 @@ <tbody> <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc" - >SA-13:14.openssh</link></entry> - - <entry>19 November 2013</entry> - - <entry><para>OpenSSH AES-GCM memory corruption - vulnerability</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc" - >SA-14:01.bsnmpd</link></entry> - - <entry>14 January 2014</entry> - - <entry><para>bsnmpd remote denial of service vulnerability</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" - >SA-14:02.ntpd</link></entry> - - <entry>14 January 2014</entry> - - <entry><para>ntpd distributed reflection Denial of Service vulnerability</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc" - >SA-14:03.openssl</link></entry> - - <entry>14 January 2014</entry> - - <entry><para>OpenSSL multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc" - >SA-14:04.bind</link></entry> - - <entry>14 January 2014</entry> - - <entry><para>BIND remote denial of service vulnerability</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:05.nfsserver.asc" - >SA-14:05.nfsserver</link></entry> - - <entry>8 April 2014</entry> - - <entry><para>Deadlock in the NFS server</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc" - >SA-14:06.openssl</link></entry> - - <entry>8 April 2014</entry> - - <entry><para>OpenSSL multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:07.devfs.asc">SA-14:07.devfs</link></entry> - <entry>30 April 2014</entry> - <entry><para>Fix devfs rules not applied by default for - jails</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc">SA-14:08.tcp</link></entry> - <entry>30 April 2014</entry> - <entry><para>Fix TCP reassembly - vulnerability</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:09.openssl.asc">SA-14:09.openssl</link></entry> - <entry>30 April 2014</entry> - <entry><para>Fix OpenSSL use-after-free - vulnerability</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:10.openssl.asc">SA-14:10.openssl</link></entry> - <entry>15 May 2014</entry> - <entry><para>Fix OpenSSL NULL pointer deference - vulnerability</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:11.sendmail.asc">SA-14:11.sendmail</link></entry> - <entry>3 June 2014</entry> - <entry><para>Fix sendmail improper close-on-exec flag - handling</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:13.pam.asc">SA-14:13.pam</link></entry> - <entry>3 June 2014</entry> - <entry><para>Fix incorrect error handling in PAM policy - parser</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc">SA-14:14.openssl</link></entry> - <entry>5 June 2014</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc">SA-14:15.iconv</link></entry> - <entry>24 June 2014</entry> - <entry><para>NULL pointer dereference and out-of-bounds - array access</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:16.file.asc">SA-14:16.file</link></entry> - <entry>24 June 2014</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc">SA-14:17.kmem</link></entry> - <entry>8 July 2014</entry> - <entry><para>Kernel memory disclosure in control messages - and SCTP notifications</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc">SA-14:18.openssl</link></entry> - <entry>9 September 2014</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc">SA-14:19.tcp</link></entry> - <entry>16 September 2014</entry> - <entry><para>Denial of Service in TCP packet - processing.</para></entry> + <entry>No advisories.</entry> + <entry> </entry> + <entry> </entry> </row> </tbody> </tgroup> @@ -244,7 +105,7 @@ <itemizedlist> <listitem> - <para>&os;/&arch.i386; &release.prev; running as a guest + <para>&os;/&arch.i386; &release.current; running as a guest operating system on <application>VirtualBox</application> can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a @@ -271,88 +132,6 @@ boot</screen> instability may be present on virtual machines running on other hypervisors, such as Xen or KVM.</para> </listitem> - - <listitem> - <para>A bug in <application>Heimdal</application> (an - implementation of <application>Kerberos</application> - authentication in &os; base system) has been fixed. It - could cause an interoperability issue between - <application>Heimdal</application> and the other - implementations including <application>MIT - Kerberos</application>. However, due to this fix, - <application>Heimdal</application> and some applications - which depend on it in the previous &os; releases do not work - with one in &release.prev; in certain cases. Errata Notice - for the supported releases to fix it will be - released.</para> - </listitem> - - <listitem> - <para>A bug in &man.killall.1; has been discovered. It - makes <userinput>killall -INT</userinput> to deliver - <literal>SIGTERM</literal> rather than the desired - <literal>SIGINT</literal>, and may cause blocking - behavior for scripts that uses it, as <literal>-I</literal> - means <quote>interactive</quote>. A workaround of this - would be to use <literal>-SIGINT</literal> instead. - This bug has been fixed on &os;-CURRENT and will be fixed - in &os; &release.current;.</para> - </listitem> - - <listitem> - <para>The &man.bxe.4; driver can cause packet corruption when - TSO (TCP Segmentation Offload) feature is enabled. This - feature is enabled by default and can be disabled by using a - <option>-tso</option> parameter of &man.ifconfig.8;. It can - be specified in &man.rc.conf.5; like the following:</para> - - <programlisting>ifconfig_bxe0="DHCP -tso"</programlisting> - - <para>This bug has been fixed on &os; - &release.current;.</para> - </listitem> - - <listitem> - <para>Due to a minor incompatibility with &man.pkg.7; version - <literal>1.2.x</literal>, &man.bsdconfig.8; will duplicate - the list of available packages for installation. This is - due to the <literal>PACKAGESITE</literal> environment - variable being set for backwards compatibility with older - versions of &man.pkg.7;. This affects generation of the - available package list only, and does not affect the - behavior when processing packages for installation.</para> - </listitem> - - <listitem> - <para>A regression in &man.pw.8; does not remove a user from - groups not specified in the provided group list when the - <literal>-G</literal> flag is used. This is expected to be - corrected in &os;-CURRENT and &os; &release.current;.</para> - </listitem> - - <listitem> - <para>&man.ipfw.8; <literal>fwd</literal> action can send - packets to the correct interface with a wrong link-layer - address when the route is updated. This bug has been fixed - on &os;-CURRENT and will be fixed in &os; - &release.current;.</para> - </listitem> - - <listitem> - <para>The &man.mount.udf.8; utility has a bug which prevents - it from mounting any UDF file system. This has been fixed - in &os;-CURRENT and &os; &release.current;.</para> - </listitem> - - <listitem> - <para>Updating LSI firmware on &man.mps.4; controllers with - the <application>sas2flash</application> utility may cause - the system to hang, or may cause the system to panic. This - is fixed in the <literal>stable/10</literal> branch with - revisions <literal>r262553</literal> and - <literal>r262575</literal>, and will be included in - &os; 10.1-RELEASE.</para> - </listitem> </itemizedlist> </sect1> Modified: releng/10.1/release/doc/share/xml/release.ent ============================================================================== --- releng/10.1/release/doc/share/xml/release.ent Tue Oct 14 12:29:24 2014 (r273081) +++ releng/10.1/release/doc/share/xml/release.ent Tue Oct 14 12:40:52 2014 (r273082) @@ -6,7 +6,7 @@ <!-- Version of the OS we're describing. This needs to be updated with each new release. --> -<!ENTITY release.current "10.0-STABLE"> +<!ENTITY release.current "10.1-RELEASE"> <!-- The previous version used for comparison in the "What's New" section. For -CURRENT, we might point back to the last @@ -16,16 +16,16 @@ <!-- The previous stable release, useful for pointing user's at the release they SHOULD be running if they don't want the bleeding edge. --> -<!ENTITY release.prev.stable "10.0-RELEASE"> +<!ENTITY release.prev.stable "9.3-RELEASE"> <!-- The next version to be released, usually used for snapshots. --> -<!ENTITY release.next "10.1-RELEASE"> +<!ENTITY release.next "10.2-RELEASE"> <!-- The name of this branch. --> -<!ENTITY release.branch "10.0-STABLE"> +<!ENTITY release.branch "10.1-STABLE"> <!-- The URL for obtaining this version of FreeBSD. --> -<!ENTITY release.url "http://www.FreeBSD.org/snapshots/"> +<!ENTITY release.url "http://www.FreeBSD.org/releases/"> <!-- The recommended mailing list to track. --> <!ENTITY release.maillist "stable"> @@ -34,10 +34,10 @@ or "release" --> <!-- WARNING: Do not forget to also change the release type in doc.relnotes.mk when updating this --> -<!ENTITY release.type "snapshot"> -<!ENTITY % release.type.current "INCLUDE"> +<!ENTITY release.type "release"> +<!ENTITY % release.type.current "IGNORE"> <!ENTITY % release.type.snapshot "IGNORE"> -<!ENTITY % release.type.release "IGNORE"> +<!ENTITY % release.type.release "INCLUDE"> <![%release.type.current;[ <!ENTITY release '&release.current;'>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410141240.s9ECertF011637>