summaryrefslogtreecommitdiffstats
path: root/release
diff options
context:
space:
mode:
authorgjb <gjb@FreeBSD.org>2017-09-18 15:17:07 +0000
committergjb <gjb@FreeBSD.org>2017-09-18 15:17:07 +0000
commit77f403d48957e2d4465e1c2140d4f153e1d45816 (patch)
tree89b6a249643375df2f1860a9266e9a768541d30a /release
parente780e7856024f604a8fa8f0b38565829ce9b63d0 (diff)
downloadFreeBSD-src-77f403d48957e2d4465e1c2140d4f153e1d45816.zip
FreeBSD-src-77f403d48957e2d4465e1c2140d4f153e1d45816.tar.gz
- Prune stale entries from 10.3-RELEASE.
- Prune entries from errata.xml and security.xml. - Update versions to reflect 10.4-RELEASE. Sponsored by: The FreeBSD Foundation
Diffstat (limited to 'release')
-rw-r--r--release/doc/en_US.ISO8859-1/errata/article.xml36
-rw-r--r--release/doc/share/xml/errata.xml125
-rw-r--r--release/doc/share/xml/release.ent14
-rw-r--r--release/doc/share/xml/security.xml197
4 files changed, 15 insertions, 357 deletions
diff --git a/release/doc/en_US.ISO8859-1/errata/article.xml b/release/doc/en_US.ISO8859-1/errata/article.xml
index 6d154c9..4377556 100644
--- a/release/doc/en_US.ISO8859-1/errata/article.xml
+++ b/release/doc/en_US.ISO8859-1/errata/article.xml
@@ -46,7 +46,8 @@
&os;.</para>
<para>This errata document for &os; &release.prev; will be
- maintained until the release of &os; &release.next;.</para>
+ maintained until &os; &release.prev; reaches
+ end-of-life.</para>
</abstract>
</info>
@@ -236,28 +237,6 @@ boot</screen>
</listitem>
<listitem>
- <para>An issue was discovered where the &man.netstat.1;
- <literal>-s</literal> option will cause a segmentation fault
- on systems with <literal>IPSEC</literal> compiled into the
- kernel. The issue was resolved in the
- <literal>stable/10</literal> branch, and an Errata Notice is
- planned after &release.prev; is released.</para>
-
- <para>[2015-08-19] Resolved as FreeBSD-EN-15:12.</para>
- </listitem>
-
- <listitem>
- <para>An issue was discovered that causes &man.make.1; to
- generate noisy output when doing source-based upgrades from
- &os; 9.3 and earlier. The issue was reported in PR 202277,
- and after investigation and determining the issue does not
- cause source-based upgrades to fail, a post-release Errata
- Notice is planned.</para>
-
- <para>[2015-08-19] Resolved as FreeBSD-EN-15:11.</para>
- </listitem>
-
- <listitem>
<para>An issue with &os; virtual machines with
<application>vagrant</application> was discovered that
affects the <application>VirtualBox</application> where the
@@ -273,17 +252,6 @@ boot</screen>
virtual machine to successfully boot, allowing access via
<literal>vagrant ssh</literal>.</para>
</listitem>
-
- <listitem>
- <para>[2015-08-16] An error was discovered in the release
- notes for &os; &release.prev; regarding the
- <literal>drm</literal> device driver. The entry for r282199
- states the driver was updated to match the version &linux;
- 3.8.13 version, however the entry should have noted the
- change affects device-independent code, and does not bring
- the <literal>drm</literal> driver fully in line with the
- stated &linux; version.</para>
- </listitem>
</itemizedlist>
</sect1>
diff --git a/release/doc/share/xml/errata.xml b/release/doc/share/xml/errata.xml
index 331f1d6..78be301 100644
--- a/release/doc/share/xml/errata.xml
+++ b/release/doc/share/xml/errata.xml
@@ -19,128 +19,9 @@
<tbody>
<row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:06.libc.asc">FreeBSD-EN-16:06.libc</link></entry>
- <entry>4&nbsp;May&nbsp;2016</entry>
- <entry><para>Performance regression in libc
- &man.hash.3;</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:07.ipi.asc">FreeBSD-EN-16:07.ipi</link></entry>
- <entry>4&nbsp;May&nbsp;2016</entry>
- <entry><para>Excessive latency in x86 IPI
- delivery</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:08.zfs.asc">FreeBSD-EN-16:08.zfs</link></entry>
- <entry>4&nbsp;May&nbsp;2016</entry>
- <entry><para>Memory leak in ZFS</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:09.freebsd-update.asc">FreeBSD-EN-16:09.freebsd-update</link></entry>
- <entry>25&nbsp;July&nbsp;2016</entry>
- <entry><para>Fix &man.freebsd-update.8; support of
- &os;&nbsp;11.0-RELEASE</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:10.dhclient.asc">FreeBSD-EN-16:10.dhclient</link></entry>
- <entry>11&nbsp;August&nbsp;2016</entry>
- <entry><para>Better handle unknown options received from
- aDHCP server</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:11.vmbus.asc">FreeBSD-EN-16:11.vmbus</link></entry>
- <entry>11&nbsp;August&nbsp;2016</entry>
- <entry><para>Avoid using spin locks for channel message
- locks</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:12.hv_storvsc.asc">FreeBSD-EN-16:12.hv_storvsc</link></entry>
- <entry>11&nbsp;August&nbsp;2016</entry>
- <entry><para>Enable INQUIRY result check only on
- Windows&nbsp;10 host systems</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:13.vmbus.asc">FreeBSD-EN-16:13.vmbus</link></entry>
- <entry>11&nbsp;August&nbsp;2016</entry>
- <entry><para>Register time counter early enough for TSC freq
- calibration</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:14.hv_storvsc.asc">FreeBSD-EN-16:14.hv_storvsc</link></entry>
- <entry>11&nbsp;August&nbsp;2016</entry>
- <entry><para>Disable incorrect callout in
- &man.hv.storvsc.4;</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:15.vmbus.asc">FreeBSD-EN-16:15.vmbus</link></entry>
- <entry>11&nbsp;August&nbsp;2016</entry>
- <entry><para>Better handle the GPADL setup failure in
- Hyper-V</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:16.hv_storvsc.asc">FreeBSD-EN-16:16.hv_storvsc</link></entry>
- <entry>11&nbsp;August&nbsp;2016</entry>
- <entry><para>Fix SCSI INQUIRY checks and error
- handling</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:17.vm.asc">FreeBSD-EN-16:17.vm</link></entry>
- <entry>25&nbsp;October&nbsp;2016</entry>
- <entry><para>Several virtual memory issues</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:19.tzcode.asc">FreeBSD-EN-16:19.tzcode</link></entry>
- <entry>6&nbsp;December&nbsp;2016</entry>
- <entry><para>Fix warnings about invalid timezone
- abbreviations</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-16:20.tzdata.asc">FreeBSD-EN-16:20.tzdata</link></entry>
- <entry>6&nbsp;December&nbsp;2016</entry>
- <entry><para>Update timezone database
- information</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-17:05.xen.asc">FreeBSD-EN-17:05.xen</link></entry>
- <entry>23&nbsp;February&nbsp;2017</entry>
- <entry><para>Xen migration enhancements</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-EN-17:06.hyperv.asc">FreeBSD-EN-17:06.hyperv</link></entry>
- <entry>12&nbsp;July&nbsp;2017</entry>
- <entry><para>Boot compatibility improvements with
- Azure virtual machines</para></entry>
+ <entry><para>No notices.</para></entry>
+ <entry><para>&nbsp;</para></entry>
+ <entry><para>&nbsp;</para></entry>
</row>
</tbody>
</tgroup>
diff --git a/release/doc/share/xml/release.ent b/release/doc/share/xml/release.ent
index 75ef58d..815f9f2 100644
--- a/release/doc/share/xml/release.ent
+++ b/release/doc/share/xml/release.ent
@@ -6,23 +6,23 @@
<!-- Version of the OS we're describing. This needs to be updated
with each new release. -->
-<!ENTITY release.current "10.3-STABLE">
+<!ENTITY release.current "10.4-STABLE">
<!-- The previous version used for comparison in the "What's New"
section. For -CURRENT, we might point back to the last
branchpoint. -->
-<!ENTITY release.prev "10.3-RELEASE">
+<!ENTITY release.prev "10.4-RELEASE">
<!-- The previous stable release, useful for pointing user's at the
release they SHOULD be running if they don't want the bleeding
edge. -->
-<!ENTITY release.prev.stable "10.2-RELEASE">
+<!ENTITY release.prev.stable "10.3-RELEASE">
<!-- The next version to be released, usually used for snapshots. -->
-<!ENTITY release.next "10.3-RELEASE">
+<!ENTITY release.next "10.4-STABLE">
<!-- The name of this branch. -->
-<!ENTITY release.branch "10.3-STABLE">
+<!ENTITY release.branch "10.4-STABLE">
<!-- The URL for obtaining this version of FreeBSD. -->
<!ENTITY release.url "https://www.FreeBSD.org/snapshots/">
@@ -38,8 +38,8 @@
<!-- WARNING: Do not forget to also change the release type in
doc.relnotes.mk when updating this -->
<!ENTITY release.type "snapshot">
-<!ENTITY % release.type.current "INCLUDE">
-<!ENTITY % release.type.snapshot "IGNORE">
+<!ENTITY % release.type.current "IGNORE">
+<!ENTITY % release.type.snapshot "INCLUDE">
<!ENTITY % release.type.release "IGNORE">
<![%release.type.current;[
diff --git a/release/doc/share/xml/security.xml b/release/doc/share/xml/security.xml
index b9a1429..74a8cd7 100644
--- a/release/doc/share/xml/security.xml
+++ b/release/doc/share/xml/security.xml
@@ -19,200 +19,9 @@
<tbody>
<row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:09.ntp.asc">FreeBSD-SA-16:09.ntp</link></entry>
- <entry>29&nbsp;April&nbsp;2016</entry>
- <entry><para>Multiple <application>ntp</application>
- vulnerabilities.</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:17.openssl.asc">FreeBSD-SA-16:17.openssl</link></entry>
- <entry>29&nbsp;April&nbsp;2016</entry>
- <entry><para>Multiple <application>OpenSSL</application>
- vulnerabilities.</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:18.atkbd.asc">FreeBSD-SA-16:18.atkbd</link></entry>
- <entry>17&nbsp;May&nbsp;2016</entry>
- <entry><para>Keyboard driver buffer overflow</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:19.sendmsg.asc">FreeBSD-SA-16:19.sendmsg</link></entry>
- <entry>17&nbsp;May&nbsp;2016</entry>
- <entry><para>Incorrect argument handling in
- &man.sendmsg.2;</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:20.linux.asc">FreeBSD-SA-16:20.linux</link></entry>
- <entry>31&nbsp;May&nbsp;2016</entry>
- <entry><para>Kernel stack disclosure in Linux compatibility
- layer</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:21.43bsd.asc">FreeBSD-SA-16:21.43bsd</link></entry>
- <entry>31&nbsp;May&nbsp;2016</entry>
- <entry><para>Kernel stack disclosure in 4.3BSD compatibility
- layer</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:22.libarchive.asc">FreeBSD-SA-16:22.libarchive</link></entry>
- <entry>31&nbsp;May&nbsp;2016</entry>
- <entry><para>Absolute path traversal
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:23.libarchive.asc">FreeBSD-SA-16:23.libarchive</link></entry>
- <entry>31&nbsp;May&nbsp;2016</entry>
- <entry><para>Absolute path traversal
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:24.ntp.asc">FreeBSD-SA-16:24.ntp</link></entry>
- <entry>3&nbsp;June&nbsp;2016</entry>
- <entry><para>Multiple <application>ntp</application>
- vulnerabilties</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:25.bspatch.asc">FreeBSD-SA-16:25.bspatch</link></entry>
- <entry>25&nbsp;July&nbsp;2016</entry>
- <entry><para>heap overflow vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:26.openssl.asc">FreeBSD-SA-16:26.openssl</link></entry>
- <entry>23&nbsp;September&nbsp;2016</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:27.openssl.asc">FreeBSD-SA-16:27.openssl</link></entry>
- <entry>26&nbsp;September&nbsp;2016</entry>
- <entry><para>Regression in <application>OpenSSL</application>
- suite</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:29.bspatch.asc">FreeBSD-SA-16:29.bspatch</link></entry>
- <entry>10&nbsp;October&nbsp;2016</entry>
- <entry><para>Heap overflow vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:30.portsnap.asc">FreeBSD-SA-16:30.portsnap</link></entry>
- <entry>10&nbsp;October&nbsp;2016</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:31.libarchive.asc">FreeBSD-SA-16:31.libarchive</link></entry>
- <entry>10&nbsp;October&nbsp;2016</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:33.openssh.asc">FreeBSD-SA-16:33.openssh</link></entry>
- <entry>2&nbsp;November&nbsp;2016</entry>
- <entry><para>Remote Denial of Service
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:35.openssl.asc">FreeBSD-SA-16:35.openssl</link></entry>
- <entry>2&nbsp;November&nbsp;2016</entry>
- <entry><para>Remote Denial of Service
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:36.telnetd.asc">FreeBSD-SA-16:36.telnetd</link></entry>
- <entry>6&nbsp;December&nbsp;2016</entry>
- <entry><para>Possible &man.login.1; argument
- injection</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:37.libc.asc">FreeBSD-SA-16:37.libc</link></entry>
- <entry>6&nbsp;December&nbsp;2016</entry>
- <entry><para>&man.link.ntoa.3; buffer overflow</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:38.bhyve.asc">FreeBSD-SA-16:38.bhyve</link></entry>
- <entry>6&nbsp;December&nbsp;2016</entry>
- <entry><para>Possible escape from &man.bhyve.8; virtual
- machine</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-16:39.ntp.asc">FreeBSD-SA-16:39.ntp</link></entry>
- <entry>22&nbsp;December&nbsp;2016</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-17:01.openssh.asc">FreeBSD-SA-17:01.openssh</link></entry>
- <entry>10&nbsp;January&nbsp;2017</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-17:02.openssl.asc">FreeBSD-SA-17:02.openssl</link></entry>
- <entry>23&nbsp;February&nbsp;2017</entry>
- <entry><para>Fix OpenSSL RC4_MD5 cipher
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-17:03.ntp.asc">FreeBSD-SA-17:03.ntp</link></entry>
- <entry>12&nbsp;April&nbsp;2017</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-17:04.ipfilter.asc">FreeBSD-SA-17:04.ipfilter</link></entry>
- <entry>27&nbsp;April&nbsp;2017</entry>
- <entry><para>Fix fragment handling panic</para></entry>
- </row>
-
- <row>
- <entry><link
- xlink:href="&security.url;/FreeBSD-SA-17:05.heimdal.asc">FreeBSD-SA-17:05.heimdal</link></entry>
- <entry>12&nbsp;July&nbsp;2017</entry>
- <entry><para>Fix KDC-REP service name validation
- vulnerability</para></entry>
+ <entry><para>No advisories.</para></entry>
+ <entry><para>&nbsp;</para></entry>
+ <entry><para>&nbsp;</para></entry>
</row>
</tbody>
</tgroup>
OpenPOWER on IntegriCloud