summaryrefslogtreecommitdiffstats
path: root/release
diff options
context:
space:
mode:
authorgjb <gjb@FreeBSD.org>2014-10-14 13:06:13 +0000
committergjb <gjb@FreeBSD.org>2014-10-14 13:06:13 +0000
commitd8c07bdc2cb44f6fa9cf6a760b0d48642f655bc0 (patch)
tree236b31874e161979bae2ec076aecb89abcffe2d2 /release
parent209cc41052e18706c7352000c509952353947386 (diff)
downloadFreeBSD-src-d8c07bdc2cb44f6fa9cf6a760b0d48642f655bc0.zip
FreeBSD-src-d8c07bdc2cb44f6fa9cf6a760b0d48642f655bc0.tar.gz
Clean up the stable/10 errata document now that releng/10.1
has precedence over releng/10.0. Approved by: re (implicit) Sponsored by: The FreeBSD Foundation
Diffstat (limited to 'release')
-rw-r--r--release/doc/en_US.ISO8859-1/errata/article.xml227
1 files changed, 3 insertions, 224 deletions
diff --git a/release/doc/en_US.ISO8859-1/errata/article.xml b/release/doc/en_US.ISO8859-1/errata/article.xml
index 9cfa949..716b680 100644
--- a/release/doc/en_US.ISO8859-1/errata/article.xml
+++ b/release/doc/en_US.ISO8859-1/errata/article.xml
@@ -91,148 +91,9 @@
<tbody>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc"
- >SA-13:14.openssh</link></entry>
-
- <entry>19&nbsp;November&nbsp;2013</entry>
-
- <entry><para>OpenSSH AES-GCM memory corruption
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc"
- >SA-14:01.bsnmpd</link></entry>
-
- <entry>14&nbsp;January&nbsp;2014</entry>
-
- <entry><para>bsnmpd remote denial of service vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc"
- >SA-14:02.ntpd</link></entry>
-
- <entry>14&nbsp;January&nbsp;2014</entry>
-
- <entry><para>ntpd distributed reflection Denial of Service vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc"
- >SA-14:03.openssl</link></entry>
-
- <entry>14&nbsp;January&nbsp;2014</entry>
-
- <entry><para>OpenSSL multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc"
- >SA-14:04.bind</link></entry>
-
- <entry>14&nbsp;January&nbsp;2014</entry>
-
- <entry><para>BIND remote denial of service vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:05.nfsserver.asc"
- >SA-14:05.nfsserver</link></entry>
-
- <entry>8&nbsp;April&nbsp;2014</entry>
-
- <entry><para>Deadlock in the NFS server</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc"
- >SA-14:06.openssl</link></entry>
-
- <entry>8&nbsp;April&nbsp;2014</entry>
-
- <entry><para>OpenSSL multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:07.devfs.asc">SA-14:07.devfs</link></entry>
- <entry>30&nbsp;April&nbsp;2014</entry>
- <entry><para>Fix devfs rules not applied by default for
- jails</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:08.tcp.asc">SA-14:08.tcp</link></entry>
- <entry>30&nbsp;April&nbsp;2014</entry>
- <entry><para>Fix TCP reassembly
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:09.openssl.asc">SA-14:09.openssl</link></entry>
- <entry>30&nbsp;April&nbsp;2014</entry>
- <entry><para>Fix OpenSSL use-after-free
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:10.openssl.asc">SA-14:10.openssl</link></entry>
- <entry>15&nbsp;May&nbsp;2014</entry>
- <entry><para>Fix OpenSSL NULL pointer deference
- vulnerability</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:11.sendmail.asc">SA-14:11.sendmail</link></entry>
- <entry>3&nbsp;June&nbsp;2014</entry>
- <entry><para>Fix sendmail improper close-on-exec flag
- handling</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:13.pam.asc">SA-14:13.pam</link></entry>
- <entry>3&nbsp;June&nbsp;2014</entry>
- <entry><para>Fix incorrect error handling in PAM policy
- parser</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc">SA-14:14.openssl</link></entry>
- <entry>5&nbsp;June&nbsp;2014</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc">SA-14:15.iconv</link></entry>
- <entry>24&nbsp;June&nbsp;2014</entry>
- <entry><para>NULL pointer dereference and out-of-bounds
- array access</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:16.file.asc">SA-14:16.file</link></entry>
- <entry>24&nbsp;June&nbsp;2014</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc">SA-14:17.kmem</link></entry>
- <entry>8&nbsp;July&nbsp;2014</entry>
- <entry><para>Kernel memory disclosure in control messages
- and SCTP notifications</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc">SA-14:18.openssl</link></entry>
- <entry>9&nbsp;September&nbsp;2014</entry>
- <entry><para>Multiple vulnerabilities</para></entry>
- </row>
-
- <row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc">SA-14:19.tcp</link></entry>
- <entry>16&nbsp;September&nbsp;2014</entry>
- <entry><para>Denial of Service in TCP packet
- processing.</para></entry>
+ <entry>No advisories.</entry>
+ <entry>&nbsp;</entry>
+ <entry>&nbsp;</entry>
</row>
</tbody>
</tgroup>
@@ -271,88 +132,6 @@ boot</screen>
instability may be present on virtual machines running
on other hypervisors, such as Xen or KVM.</para>
</listitem>
-
- <listitem>
- <para>A bug in <application>Heimdal</application> (an
- implementation of <application>Kerberos</application>
- authentication in &os; base system) has been fixed. It
- could cause an interoperability issue between
- <application>Heimdal</application> and the other
- implementations including <application>MIT
- Kerberos</application>. However, due to this fix,
- <application>Heimdal</application> and some applications
- which depend on it in the previous &os; releases do not work
- with one in &release.prev; in certain cases. Errata Notice
- for the supported releases to fix it will be
- released.</para>
- </listitem>
-
- <listitem>
- <para>A bug in &man.killall.1; has been discovered. It
- makes <userinput>killall -INT</userinput> to deliver
- <literal>SIGTERM</literal> rather than the desired
- <literal>SIGINT</literal>, and may cause blocking
- behavior for scripts that uses it, as <literal>-I</literal>
- means <quote>interactive</quote>. A workaround of this
- would be to use <literal>-SIGINT</literal> instead.
- This bug has been fixed on &os;-CURRENT and will be fixed
- in &os; &release.current;.</para>
- </listitem>
-
- <listitem>
- <para>The &man.bxe.4; driver can cause packet corruption when
- TSO (TCP Segmentation Offload) feature is enabled. This
- feature is enabled by default and can be disabled by using a
- <option>-tso</option> parameter of &man.ifconfig.8;. It can
- be specified in &man.rc.conf.5; like the following:</para>
-
- <programlisting>ifconfig_bxe0="DHCP -tso"</programlisting>
-
- <para>This bug has been fixed on &os;
- &release.current;.</para>
- </listitem>
-
- <listitem>
- <para>Due to a minor incompatibility with &man.pkg.7; version
- <literal>1.2.x</literal>, &man.bsdconfig.8; will duplicate
- the list of available packages for installation. This is
- due to the <literal>PACKAGESITE</literal> environment
- variable being set for backwards compatibility with older
- versions of &man.pkg.7;. This affects generation of the
- available package list only, and does not affect the
- behavior when processing packages for installation.</para>
- </listitem>
-
- <listitem>
- <para>A regression in &man.pw.8; does not remove a user from
- groups not specified in the provided group list when the
- <literal>-G</literal> flag is used. This is expected to be
- corrected in &os;-CURRENT and &os; &release.current;.</para>
- </listitem>
-
- <listitem>
- <para>&man.ipfw.8; <literal>fwd</literal> action can send
- packets to the correct interface with a wrong link-layer
- address when the route is updated. This bug has been fixed
- on &os;-CURRENT and will be fixed in &os;
- &release.current;.</para>
- </listitem>
-
- <listitem>
- <para>The &man.mount.udf.8; utility has a bug which prevents
- it from mounting any UDF file system. This has been fixed
- in &os;-CURRENT and &os; &release.current;.</para>
- </listitem>
-
- <listitem>
- <para>Updating LSI firmware on &man.mps.4; controllers with
- the <application>sas2flash</application> utility may cause
- the system to hang, or may cause the system to panic. This
- is fixed in the <literal>stable/10</literal> branch with
- revisions <literal>r262553</literal> and
- <literal>r262575</literal>, and will be included in
- &os;&nbsp;10.1-RELEASE.</para>
- </listitem>
</itemizedlist>
</sect1>
OpenPOWER on IntegriCloud