Author: gjb Date: Mon Sep 18 15:17:07 2017 New Revision: 323708 URL: https://svnweb.freebsd.org/changeset/base/323708
Log: - Prune stale entries from 10.3-RELEASE. - Prune entries from errata.xml and security.xml. - Update versions to reflect 10.4-RELEASE. Sponsored by: The FreeBSD Foundation Modified: stable/10/release/doc/en_US.ISO8859-1/errata/article.xml stable/10/release/doc/share/xml/errata.xml stable/10/release/doc/share/xml/release.ent stable/10/release/doc/share/xml/security.xml Modified: stable/10/release/doc/en_US.ISO8859-1/errata/article.xml ============================================================================== --- stable/10/release/doc/en_US.ISO8859-1/errata/article.xml Mon Sep 18 15:17:01 2017 (r323707) +++ stable/10/release/doc/en_US.ISO8859-1/errata/article.xml Mon Sep 18 15:17:07 2017 (r323708) @@ -46,7 +46,8 @@ &os;.</para> <para>This errata document for &os; &release.prev; will be - maintained until the release of &os; &release.next;.</para> + maintained until &os; &release.prev; reaches + end-of-life.</para> </abstract> </info> @@ -236,28 +237,6 @@ boot</screen> </listitem> <listitem> - <para>An issue was discovered where the &man.netstat.1; - <literal>-s</literal> option will cause a segmentation fault - on systems with <literal>IPSEC</literal> compiled into the - kernel. The issue was resolved in the - <literal>stable/10</literal> branch, and an Errata Notice is - planned after &release.prev; is released.</para> - - <para>[2015-08-19] Resolved as FreeBSD-EN-15:12.</para> - </listitem> - - <listitem> - <para>An issue was discovered that causes &man.make.1; to - generate noisy output when doing source-based upgrades from - &os; 9.3 and earlier. The issue was reported in PR 202277, - and after investigation and determining the issue does not - cause source-based upgrades to fail, a post-release Errata - Notice is planned.</para> - - <para>[2015-08-19] Resolved as FreeBSD-EN-15:11.</para> - </listitem> - - <listitem> <para>An issue with &os; virtual machines with <application>vagrant</application> was discovered that affects the <application>VirtualBox</application> where the @@ -272,17 +251,6 @@ boot</screen> invocation of <literal>vagrant up</literal> will allow the virtual machine to successfully boot, allowing access via <literal>vagrant ssh</literal>.</para> - </listitem> - - <listitem> - <para>[2015-08-16] An error was discovered in the release - notes for &os; &release.prev; regarding the - <literal>drm</literal> device driver. The entry for r282199 - states the driver was updated to match the version &linux; - 3.8.13 version, however the entry should have noted the - change affects device-independent code, and does not bring - the <literal>drm</literal> driver fully in line with the - stated &linux; version.</para> </listitem> </itemizedlist> </sect1> Modified: stable/10/release/doc/share/xml/errata.xml ============================================================================== --- stable/10/release/doc/share/xml/errata.xml Mon Sep 18 15:17:01 2017 (r323707) +++ stable/10/release/doc/share/xml/errata.xml Mon Sep 18 15:17:07 2017 (r323708) @@ -19,128 +19,9 @@ <tbody> <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:06.libc.asc">FreeBSD-EN-16:06.libc</link></entry> - <entry>4 May 2016</entry> - <entry><para>Performance regression in libc - &man.hash.3;</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:07.ipi.asc">FreeBSD-EN-16:07.ipi</link></entry> - <entry>4 May 2016</entry> - <entry><para>Excessive latency in x86 IPI - delivery</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:08.zfs.asc">FreeBSD-EN-16:08.zfs</link></entry> - <entry>4 May 2016</entry> - <entry><para>Memory leak in ZFS</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:09.freebsd-update.asc">FreeBSD-EN-16:09.freebsd-update</link></entry> - <entry>25 July 2016</entry> - <entry><para>Fix &man.freebsd-update.8; support of - &os; 11.0-RELEASE</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:10.dhclient.asc">FreeBSD-EN-16:10.dhclient</link></entry> - <entry>11 August 2016</entry> - <entry><para>Better handle unknown options received from - aDHCP server</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:11.vmbus.asc">FreeBSD-EN-16:11.vmbus</link></entry> - <entry>11 August 2016</entry> - <entry><para>Avoid using spin locks for channel message - locks</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:12.hv_storvsc.asc">FreeBSD-EN-16:12.hv_storvsc</link></entry> - <entry>11 August 2016</entry> - <entry><para>Enable INQUIRY result check only on - Windows 10 host systems</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:13.vmbus.asc">FreeBSD-EN-16:13.vmbus</link></entry> - <entry>11 August 2016</entry> - <entry><para>Register time counter early enough for TSC freq - calibration</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:14.hv_storvsc.asc">FreeBSD-EN-16:14.hv_storvsc</link></entry> - <entry>11 August 2016</entry> - <entry><para>Disable incorrect callout in - &man.hv.storvsc.4;</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:15.vmbus.asc">FreeBSD-EN-16:15.vmbus</link></entry> - <entry>11 August 2016</entry> - <entry><para>Better handle the GPADL setup failure in - Hyper-V</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:16.hv_storvsc.asc">FreeBSD-EN-16:16.hv_storvsc</link></entry> - <entry>11 August 2016</entry> - <entry><para>Fix SCSI INQUIRY checks and error - handling</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:17.vm.asc">FreeBSD-EN-16:17.vm</link></entry> - <entry>25 October 2016</entry> - <entry><para>Several virtual memory issues</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:19.tzcode.asc">FreeBSD-EN-16:19.tzcode</link></entry> - <entry>6 December 2016</entry> - <entry><para>Fix warnings about invalid timezone - abbreviations</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-16:20.tzdata.asc">FreeBSD-EN-16:20.tzdata</link></entry> - <entry>6 December 2016</entry> - <entry><para>Update timezone database - information</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-17:05.xen.asc">FreeBSD-EN-17:05.xen</link></entry> - <entry>23 February 2017</entry> - <entry><para>Xen migration enhancements</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-EN-17:06.hyperv.asc">FreeBSD-EN-17:06.hyperv</link></entry> - <entry>12 July 2017</entry> - <entry><para>Boot compatibility improvements with - Azure virtual machines</para></entry> + <entry><para>No notices.</para></entry> + <entry><para> </para></entry> + <entry><para> </para></entry> </row> </tbody> </tgroup> Modified: stable/10/release/doc/share/xml/release.ent ============================================================================== --- stable/10/release/doc/share/xml/release.ent Mon Sep 18 15:17:01 2017 (r323707) +++ stable/10/release/doc/share/xml/release.ent Mon Sep 18 15:17:07 2017 (r323708) @@ -6,23 +6,23 @@ <!-- Version of the OS we're describing. This needs to be updated with each new release. --> -<!ENTITY release.current "10.3-STABLE"> +<!ENTITY release.current "10.4-STABLE"> <!-- The previous version used for comparison in the "What's New" section. For -CURRENT, we might point back to the last branchpoint. --> -<!ENTITY release.prev "10.3-RELEASE"> +<!ENTITY release.prev "10.4-RELEASE"> <!-- The previous stable release, useful for pointing user's at the release they SHOULD be running if they don't want the bleeding edge. --> -<!ENTITY release.prev.stable "10.2-RELEASE"> +<!ENTITY release.prev.stable "10.3-RELEASE"> <!-- The next version to be released, usually used for snapshots. --> -<!ENTITY release.next "10.3-RELEASE"> +<!ENTITY release.next "10.4-STABLE"> <!-- The name of this branch. --> -<!ENTITY release.branch "10.3-STABLE"> +<!ENTITY release.branch "10.4-STABLE"> <!-- The URL for obtaining this version of FreeBSD. --> <!ENTITY release.url "https://www.FreeBSD.org/snapshots/"> @@ -38,8 +38,8 @@ <!-- WARNING: Do not forget to also change the release type in doc.relnotes.mk when updating this --> <!ENTITY release.type "snapshot"> -<!ENTITY % release.type.current "INCLUDE"> -<!ENTITY % release.type.snapshot "IGNORE"> +<!ENTITY % release.type.current "IGNORE"> +<!ENTITY % release.type.snapshot "INCLUDE"> <!ENTITY % release.type.release "IGNORE"> <![%release.type.current;[ Modified: stable/10/release/doc/share/xml/security.xml ============================================================================== --- stable/10/release/doc/share/xml/security.xml Mon Sep 18 15:17:01 2017 (r323707) +++ stable/10/release/doc/share/xml/security.xml Mon Sep 18 15:17:07 2017 (r323708) @@ -19,200 +19,9 @@ <tbody> <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:09.ntp.asc">FreeBSD-SA-16:09.ntp</link></entry> - <entry>29 April 2016</entry> - <entry><para>Multiple <application>ntp</application> - vulnerabilities.</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:17.openssl.asc">FreeBSD-SA-16:17.openssl</link></entry> - <entry>29 April 2016</entry> - <entry><para>Multiple <application>OpenSSL</application> - vulnerabilities.</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:18.atkbd.asc">FreeBSD-SA-16:18.atkbd</link></entry> - <entry>17 May 2016</entry> - <entry><para>Keyboard driver buffer overflow</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:19.sendmsg.asc">FreeBSD-SA-16:19.sendmsg</link></entry> - <entry>17 May 2016</entry> - <entry><para>Incorrect argument handling in - &man.sendmsg.2;</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:20.linux.asc">FreeBSD-SA-16:20.linux</link></entry> - <entry>31 May 2016</entry> - <entry><para>Kernel stack disclosure in Linux compatibility - layer</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:21.43bsd.asc">FreeBSD-SA-16:21.43bsd</link></entry> - <entry>31 May 2016</entry> - <entry><para>Kernel stack disclosure in 4.3BSD compatibility - layer</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:22.libarchive.asc">FreeBSD-SA-16:22.libarchive</link></entry> - <entry>31 May 2016</entry> - <entry><para>Absolute path traversal - vulnerability</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:23.libarchive.asc">FreeBSD-SA-16:23.libarchive</link></entry> - <entry>31 May 2016</entry> - <entry><para>Absolute path traversal - vulnerability</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:24.ntp.asc">FreeBSD-SA-16:24.ntp</link></entry> - <entry>3 June 2016</entry> - <entry><para>Multiple <application>ntp</application> - vulnerabilties</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:25.bspatch.asc">FreeBSD-SA-16:25.bspatch</link></entry> - <entry>25 July 2016</entry> - <entry><para>heap overflow vulnerability</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:26.openssl.asc">FreeBSD-SA-16:26.openssl</link></entry> - <entry>23 September 2016</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:27.openssl.asc">FreeBSD-SA-16:27.openssl</link></entry> - <entry>26 September 2016</entry> - <entry><para>Regression in <application>OpenSSL</application> - suite</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:29.bspatch.asc">FreeBSD-SA-16:29.bspatch</link></entry> - <entry>10 October 2016</entry> - <entry><para>Heap overflow vulnerability</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:30.portsnap.asc">FreeBSD-SA-16:30.portsnap</link></entry> - <entry>10 October 2016</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:31.libarchive.asc">FreeBSD-SA-16:31.libarchive</link></entry> - <entry>10 October 2016</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:33.openssh.asc">FreeBSD-SA-16:33.openssh</link></entry> - <entry>2 November 2016</entry> - <entry><para>Remote Denial of Service - vulnerability</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:35.openssl.asc">FreeBSD-SA-16:35.openssl</link></entry> - <entry>2 November 2016</entry> - <entry><para>Remote Denial of Service - vulnerability</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:36.telnetd.asc">FreeBSD-SA-16:36.telnetd</link></entry> - <entry>6 December 2016</entry> - <entry><para>Possible &man.login.1; argument - injection</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:37.libc.asc">FreeBSD-SA-16:37.libc</link></entry> - <entry>6 December 2016</entry> - <entry><para>&man.link.ntoa.3; buffer overflow</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:38.bhyve.asc">FreeBSD-SA-16:38.bhyve</link></entry> - <entry>6 December 2016</entry> - <entry><para>Possible escape from &man.bhyve.8; virtual - machine</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-16:39.ntp.asc">FreeBSD-SA-16:39.ntp</link></entry> - <entry>22 December 2016</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-17:01.openssh.asc">FreeBSD-SA-17:01.openssh</link></entry> - <entry>10 January 2017</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-17:02.openssl.asc">FreeBSD-SA-17:02.openssl</link></entry> - <entry>23 February 2017</entry> - <entry><para>Fix OpenSSL RC4_MD5 cipher - vulnerability</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-17:03.ntp.asc">FreeBSD-SA-17:03.ntp</link></entry> - <entry>12 April 2017</entry> - <entry><para>Multiple vulnerabilities</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-17:04.ipfilter.asc">FreeBSD-SA-17:04.ipfilter</link></entry> - <entry>27 April 2017</entry> - <entry><para>Fix fragment handling panic</para></entry> - </row> - - <row> - <entry><link - xlink:href="&security.url;/FreeBSD-SA-17:05.heimdal.asc">FreeBSD-SA-17:05.heimdal</link></entry> - <entry>12 July 2017</entry> - <entry><para>Fix KDC-REP service name validation - vulnerability</para></entry> + <entry><para>No advisories.</para></entry> + <entry><para> </para></entry> + <entry><para> </para></entry> </row> </tbody> </tgroup> _______________________________________________ svn-src-stable-10@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/svn-src-stable-10 To unsubscribe, send any mail to "svn-src-stable-10-unsubscr...@freebsd.org"