From owner-svn-src-all@FreeBSD.ORG Tue Oct 14 12:40:54 2014 Return-Path: Delivered-To: svn-src-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0BCA5FF1; Tue, 14 Oct 2014 12:40:54 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E9FDF897; Tue, 14 Oct 2014 12:40:53 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9ECer82011639; Tue, 14 Oct 2014 12:40:53 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9ECertF011637; Tue, 14 Oct 2014 12:40:53 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410141240.s9ECertF011637@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 14 Oct 2014 12:40:53 +0000 (UTC) To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-releng@freebsd.org Subject: svn commit: r273082 - in releng/10.1/release/doc: en_US.ISO8859-1/errata share/xml X-SVN-Group: releng MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 14 Oct 2014 12:40:54 -0000 Author: gjb Date: Tue Oct 14 12:40:52 2014 New Revision: 273082 URL: https://svnweb.freebsd.org/changeset/base/273082 Log: - Correct the FreeBSD release displayed on the 10.1-R errata page. - Trim stale errata items from 10.0-RELEASE, but keep the entry regarding FreeBSD/i386 on VirtualBox, as I am unsure if the underlying cause was identified and/or corrected. - Fix a few occurances of 'release.prev' macros that should be 'release.current'. [1] - Switch release.ent entities to reflect a release, and update versions where appropriate. Submitted by: pluknet [1] Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml releng/10.1/release/doc/share/xml/release.ent Modified: releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml ============================================================================== --- releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml Tue Oct 14 12:29:24 2014 (r273081) +++ releng/10.1/release/doc/en_US.ISO8859-1/errata/article.xml Tue Oct 14 12:40:52 2014 (r273082) @@ -10,7 +10,7 @@ xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0"> - &os; &release.prev; Errata + &os; &release.current; Errata The &os; Project @@ -31,7 +31,7 @@ - This document lists errata items for &os; &release.prev;, + This document lists errata items for &os; &release.current;, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information @@ -41,7 +41,7 @@ always be consulted before installing this version of &os;. - This errata document for &os; &release.prev; will be + This errata document for &os; &release.current; will be maintained until the release of &os; &release.next;. @@ -50,7 +50,7 @@ Introduction This errata document contains late-breaking - news about &os; &release.prev; Before installing this + news about &os; &release.current; before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed. @@ -91,148 +91,9 @@ - SA-13:14.openssh - - 19 November 2013 - - OpenSSH AES-GCM memory corruption - vulnerability - - - - SA-14:01.bsnmpd - - 14 January 2014 - - bsnmpd remote denial of service vulnerability - - - - SA-14:02.ntpd - - 14 January 2014 - - ntpd distributed reflection Denial of Service vulnerability - - - - SA-14:03.openssl - - 14 January 2014 - - OpenSSL multiple vulnerabilities - - - - SA-14:04.bind - - 14 January 2014 - - BIND remote denial of service vulnerability - - - - SA-14:05.nfsserver - - 8 April 2014 - - Deadlock in the NFS server - - - - SA-14:06.openssl - - 8 April 2014 - - OpenSSL multiple vulnerabilities - - - - SA-14:07.devfs - 30 April 2014 - Fix devfs rules not applied by default for - jails - - - - SA-14:08.tcp - 30 April 2014 - Fix TCP reassembly - vulnerability - - - - SA-14:09.openssl - 30 April 2014 - Fix OpenSSL use-after-free - vulnerability - - - - SA-14:10.openssl - 15 May 2014 - Fix OpenSSL NULL pointer deference - vulnerability - - - - SA-14:11.sendmail - 3 June 2014 - Fix sendmail improper close-on-exec flag - handling - - - - SA-14:13.pam - 3 June 2014 - Fix incorrect error handling in PAM policy - parser - - - - SA-14:14.openssl - 5 June 2014 - Multiple vulnerabilities - - - - SA-14:15.iconv - 24 June 2014 - NULL pointer dereference and out-of-bounds - array access - - - - SA-14:16.file - 24 June 2014 - Multiple vulnerabilities - - - - SA-14:17.kmem - 8 July 2014 - Kernel memory disclosure in control messages - and SCTP notifications - - - - SA-14:18.openssl - 9 September 2014 - Multiple vulnerabilities - - - - SA-14:19.tcp - 16 September 2014 - Denial of Service in TCP packet - processing. + No advisories. +   +   @@ -244,7 +105,7 @@ - &os;/&arch.i386; &release.prev; running as a guest + &os;/&arch.i386; &release.current; running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a @@ -271,88 +132,6 @@ boot instability may be present on virtual machines running on other hypervisors, such as Xen or KVM. - - - A bug in Heimdal (an - implementation of Kerberos - authentication in &os; base system) has been fixed. It - could cause an interoperability issue between - Heimdal and the other - implementations including MIT - Kerberos. However, due to this fix, - Heimdal and some applications - which depend on it in the previous &os; releases do not work - with one in &release.prev; in certain cases. Errata Notice - for the supported releases to fix it will be - released. - - - - A bug in &man.killall.1; has been discovered. It - makes killall -INT to deliver - SIGTERM rather than the desired - SIGINT, and may cause blocking - behavior for scripts that uses it, as -I - means interactive. A workaround of this - would be to use -SIGINT instead. - This bug has been fixed on &os;-CURRENT and will be fixed - in &os; &release.current;. - - - - The &man.bxe.4; driver can cause packet corruption when - TSO (TCP Segmentation Offload) feature is enabled. This - feature is enabled by default and can be disabled by using a - parameter of &man.ifconfig.8;. It can - be specified in &man.rc.conf.5; like the following: - - ifconfig_bxe0="DHCP -tso" - - This bug has been fixed on &os; - &release.current;. - - - - Due to a minor incompatibility with &man.pkg.7; version - 1.2.x, &man.bsdconfig.8; will duplicate - the list of available packages for installation. This is - due to the PACKAGESITE environment - variable being set for backwards compatibility with older - versions of &man.pkg.7;. This affects generation of the - available package list only, and does not affect the - behavior when processing packages for installation. - - - - A regression in &man.pw.8; does not remove a user from - groups not specified in the provided group list when the - -G flag is used. This is expected to be - corrected in &os;-CURRENT and &os; &release.current;. - - - - &man.ipfw.8; fwd action can send - packets to the correct interface with a wrong link-layer - address when the route is updated. This bug has been fixed - on &os;-CURRENT and will be fixed in &os; - &release.current;. - - - - The &man.mount.udf.8; utility has a bug which prevents - it from mounting any UDF file system. This has been fixed - in &os;-CURRENT and &os; &release.current;. - - - - Updating LSI firmware on &man.mps.4; controllers with - the sas2flash utility may cause - the system to hang, or may cause the system to panic. This - is fixed in the stable/10 branch with - revisions r262553 and - r262575, and will be included in - &os; 10.1-RELEASE. - Modified: releng/10.1/release/doc/share/xml/release.ent ============================================================================== --- releng/10.1/release/doc/share/xml/release.ent Tue Oct 14 12:29:24 2014 (r273081) +++ releng/10.1/release/doc/share/xml/release.ent Tue Oct 14 12:40:52 2014 (r273082) @@ -6,7 +6,7 @@ - + - + - + - + - + @@ -34,10 +34,10 @@ or "release" --> - - + + - +