svn commit: r323708 - in stable/10/release/doc: en_US.ISO8859-1/errata share/xml

Glen Barber gjb at FreeBSD.org
Mon Sep 18 15:17:09 UTC 2017


Author: gjb
Date: Mon Sep 18 15:17:07 2017
New Revision: 323708
URL: https://svnweb.freebsd.org/changeset/base/323708

Log:
  - Prune stale entries from 10.3-RELEASE.
  - Prune entries from errata.xml and security.xml.
  - Update versions to reflect 10.4-RELEASE.
  
  Sponsored by:	The FreeBSD Foundation

Modified:
  stable/10/release/doc/en_US.ISO8859-1/errata/article.xml
  stable/10/release/doc/share/xml/errata.xml
  stable/10/release/doc/share/xml/release.ent
  stable/10/release/doc/share/xml/security.xml

Modified: stable/10/release/doc/en_US.ISO8859-1/errata/article.xml
==============================================================================
--- stable/10/release/doc/en_US.ISO8859-1/errata/article.xml	Mon Sep 18 15:17:01 2017	(r323707)
+++ stable/10/release/doc/en_US.ISO8859-1/errata/article.xml	Mon Sep 18 15:17:07 2017	(r323708)
@@ -46,7 +46,8 @@
 	&os;.</para>
 
       <para>This errata document for &os; &release.prev; will be
-	maintained until the release of &os; &release.next;.</para>
+	maintained until &os; &release.prev; reaches
+	end-of-life.</para>
     </abstract>
   </info>
 
@@ -236,28 +237,6 @@ boot</screen>
       </listitem>
 
       <listitem>
-	<para>An issue was discovered where the &man.netstat.1;
-	  <literal>-s</literal> option will cause a segmentation fault
-	  on systems with <literal>IPSEC</literal> compiled into the
-	  kernel.  The issue was resolved in the
-	  <literal>stable/10</literal> branch, and an Errata Notice is
-	  planned after &release.prev; is released.</para>
-
-	<para>[2015-08-19] Resolved as FreeBSD-EN-15:12.</para>
-      </listitem>
-
-      <listitem>
-	<para>An issue was discovered that causes &man.make.1; to
-	  generate noisy output when doing source-based upgrades from
-	  &os; 9.3 and earlier.  The issue was reported in PR 202277,
-	  and after investigation and determining the issue does not
-	  cause source-based upgrades to fail, a post-release Errata
-	  Notice is planned.</para>
-
-	<para>[2015-08-19] Resolved as FreeBSD-EN-15:11.</para>
-      </listitem>
-
-      <listitem>
 	<para>An issue with &os; virtual machines with
 	  <application>vagrant</application> was discovered that
 	  affects the <application>VirtualBox</application> where the
@@ -272,17 +251,6 @@ boot</screen>
 	  invocation of <literal>vagrant up</literal> will allow the
 	  virtual machine to successfully boot, allowing access via
 	  <literal>vagrant ssh</literal>.</para>
-      </listitem>
-
-      <listitem>
-	<para>[2015-08-16] An error was discovered in the release
-	  notes for &os; &release.prev; regarding the
-	  <literal>drm</literal> device driver.  The entry for r282199
-	  states the driver was updated to match the version &linux;
-	  3.8.13 version, however the entry should have noted the
-	  change affects device-independent code, and does not bring
-	  the <literal>drm</literal> driver fully in line with the
-	  stated &linux; version.</para>
       </listitem>
     </itemizedlist>
   </sect1>

Modified: stable/10/release/doc/share/xml/errata.xml
==============================================================================
--- stable/10/release/doc/share/xml/errata.xml	Mon Sep 18 15:17:01 2017	(r323707)
+++ stable/10/release/doc/share/xml/errata.xml	Mon Sep 18 15:17:07 2017	(r323708)
@@ -19,128 +19,9 @@
 
     <tbody>
       <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:06.libc.asc">FreeBSD-EN-16:06.libc</link></entry>
-	<entry>4 May 2016</entry>
-	<entry><para>Performance regression in libc
-	    &man.hash.3;</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:07.ipi.asc">FreeBSD-EN-16:07.ipi</link></entry>
-	<entry>4 May 2016</entry>
-	<entry><para>Excessive latency in x86 IPI
-	    delivery</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:08.zfs.asc">FreeBSD-EN-16:08.zfs</link></entry>
-	<entry>4 May 2016</entry>
-	<entry><para>Memory leak in ZFS</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:09.freebsd-update.asc">FreeBSD-EN-16:09.freebsd-update</link></entry>
-	<entry>25 July 2016</entry>
-	<entry><para>Fix &man.freebsd-update.8; support of
-	    &os; 11.0-RELEASE</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:10.dhclient.asc">FreeBSD-EN-16:10.dhclient</link></entry>
-	<entry>11 August 2016</entry>
-	<entry><para>Better handle unknown options received from
-	    aDHCP server</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:11.vmbus.asc">FreeBSD-EN-16:11.vmbus</link></entry>
-	<entry>11 August 2016</entry>
-	<entry><para>Avoid using spin locks for channel message
-	    locks</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:12.hv_storvsc.asc">FreeBSD-EN-16:12.hv_storvsc</link></entry>
-	<entry>11 August 2016</entry>
-	<entry><para>Enable INQUIRY result check only on
-	    Windows 10 host systems</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:13.vmbus.asc">FreeBSD-EN-16:13.vmbus</link></entry>
-	<entry>11 August 2016</entry>
-	<entry><para>Register time counter early enough for TSC freq
-	    calibration</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:14.hv_storvsc.asc">FreeBSD-EN-16:14.hv_storvsc</link></entry>
-	<entry>11 August 2016</entry>
-	<entry><para>Disable incorrect callout in
-	    &man.hv.storvsc.4;</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:15.vmbus.asc">FreeBSD-EN-16:15.vmbus</link></entry>
-	<entry>11 August 2016</entry>
-	<entry><para>Better handle the GPADL setup failure in
-	    Hyper-V</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:16.hv_storvsc.asc">FreeBSD-EN-16:16.hv_storvsc</link></entry>
-	<entry>11 August 2016</entry>
-	<entry><para>Fix SCSI INQUIRY checks and error
-	    handling</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:17.vm.asc">FreeBSD-EN-16:17.vm</link></entry>
-	<entry>25 October 2016</entry>
-	<entry><para>Several virtual memory issues</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:19.tzcode.asc">FreeBSD-EN-16:19.tzcode</link></entry>
-	<entry>6 December 2016</entry>
-	<entry><para>Fix warnings about invalid timezone
-	    abbreviations</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:20.tzdata.asc">FreeBSD-EN-16:20.tzdata</link></entry>
-	<entry>6 December 2016</entry>
-	<entry><para>Update timezone database
-	    information</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-17:05.xen.asc">FreeBSD-EN-17:05.xen</link></entry>
-	<entry>23 February 2017</entry>
-	<entry><para>Xen migration enhancements</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-17:06.hyperv.asc">FreeBSD-EN-17:06.hyperv</link></entry>
-	<entry>12 July 2017</entry>
-	<entry><para>Boot compatibility improvements with
-	    Azure virtual machines</para></entry>
+	<entry><para>No notices.</para></entry>
+	<entry><para> </para></entry>
+	<entry><para> </para></entry>
       </row>
     </tbody>
   </tgroup>

Modified: stable/10/release/doc/share/xml/release.ent
==============================================================================
--- stable/10/release/doc/share/xml/release.ent	Mon Sep 18 15:17:01 2017	(r323707)
+++ stable/10/release/doc/share/xml/release.ent	Mon Sep 18 15:17:07 2017	(r323708)
@@ -6,23 +6,23 @@
 
 <!-- Version of the OS we're describing.  This needs to be updated
      with each new release. -->
-<!ENTITY release.current "10.3-STABLE">
+<!ENTITY release.current "10.4-STABLE">
 
 <!-- The previous version used for comparison in the "What's New"
      section.  For -CURRENT, we might point back to the last
      branchpoint. -->
-<!ENTITY release.prev "10.3-RELEASE">
+<!ENTITY release.prev "10.4-RELEASE">
 
 <!-- The previous stable release, useful for pointing user's at the
      release they SHOULD be running if they don't want the bleeding
      edge. -->
-<!ENTITY release.prev.stable "10.2-RELEASE">
+<!ENTITY release.prev.stable "10.3-RELEASE">
 
 <!-- The next version to be released, usually used for snapshots. -->
-<!ENTITY release.next "10.3-RELEASE">
+<!ENTITY release.next "10.4-STABLE">
 
 <!-- The name of this branch. -->
-<!ENTITY release.branch "10.3-STABLE">
+<!ENTITY release.branch "10.4-STABLE">
 
 <!-- The URL for obtaining this version of FreeBSD. -->
 <!ENTITY release.url "https://www.FreeBSD.org/snapshots/">
@@ -38,8 +38,8 @@
 <!-- WARNING: Do not forget to also change the release type in
      doc.relnotes.mk when updating this -->
 <!ENTITY release.type "snapshot">
-<!ENTITY % release.type.current  "INCLUDE">
-<!ENTITY % release.type.snapshot "IGNORE">
+<!ENTITY % release.type.current  "IGNORE">
+<!ENTITY % release.type.snapshot "INCLUDE">
 <!ENTITY % release.type.release "IGNORE">
 
 <![%release.type.current;[

Modified: stable/10/release/doc/share/xml/security.xml
==============================================================================
--- stable/10/release/doc/share/xml/security.xml	Mon Sep 18 15:17:01 2017	(r323707)
+++ stable/10/release/doc/share/xml/security.xml	Mon Sep 18 15:17:07 2017	(r323708)
@@ -19,200 +19,9 @@
 
     <tbody>
       <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:09.ntp.asc">FreeBSD-SA-16:09.ntp</link></entry>
-	<entry>29 April 2016</entry>
-	<entry><para>Multiple <application>ntp</application>
-	    vulnerabilities.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:17.openssl.asc">FreeBSD-SA-16:17.openssl</link></entry>
-	<entry>29 April 2016</entry>
-	<entry><para>Multiple <application>OpenSSL</application>
-	    vulnerabilities.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:18.atkbd.asc">FreeBSD-SA-16:18.atkbd</link></entry>
-	<entry>17 May 2016</entry>
-	<entry><para>Keyboard driver buffer overflow</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:19.sendmsg.asc">FreeBSD-SA-16:19.sendmsg</link></entry>
-	<entry>17 May 2016</entry>
-	<entry><para>Incorrect argument handling in
-	    &man.sendmsg.2;</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:20.linux.asc">FreeBSD-SA-16:20.linux</link></entry>
-	<entry>31 May 2016</entry>
-	<entry><para>Kernel stack disclosure in Linux compatibility
-	  layer</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:21.43bsd.asc">FreeBSD-SA-16:21.43bsd</link></entry>
-	<entry>31 May 2016</entry>
-	<entry><para>Kernel stack disclosure in 4.3BSD compatibility
-	  layer</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:22.libarchive.asc">FreeBSD-SA-16:22.libarchive</link></entry>
-	<entry>31 May 2016</entry>
-	<entry><para>Absolute path traversal
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:23.libarchive.asc">FreeBSD-SA-16:23.libarchive</link></entry>
-	<entry>31 May 2016</entry>
-	<entry><para>Absolute path traversal
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:24.ntp.asc">FreeBSD-SA-16:24.ntp</link></entry>
-	<entry>3 June 2016</entry>
-	<entry><para>Multiple <application>ntp</application>
-	    vulnerabilties</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:25.bspatch.asc">FreeBSD-SA-16:25.bspatch</link></entry>
-	<entry>25 July 2016</entry>
-	<entry><para>heap overflow vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:26.openssl.asc">FreeBSD-SA-16:26.openssl</link></entry>
-	<entry>23 September 2016</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:27.openssl.asc">FreeBSD-SA-16:27.openssl</link></entry>
-	<entry>26 September 2016</entry>
-	<entry><para>Regression in <application>OpenSSL</application>
-	    suite</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:29.bspatch.asc">FreeBSD-SA-16:29.bspatch</link></entry>
-	<entry>10 October 2016</entry>
-	<entry><para>Heap overflow vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:30.portsnap.asc">FreeBSD-SA-16:30.portsnap</link></entry>
-	<entry>10 October 2016</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:31.libarchive.asc">FreeBSD-SA-16:31.libarchive</link></entry>
-	<entry>10 October 2016</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:33.openssh.asc">FreeBSD-SA-16:33.openssh</link></entry>
-	<entry>2 November 2016</entry>
-	<entry><para>Remote Denial of Service
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:35.openssl.asc">FreeBSD-SA-16:35.openssl</link></entry>
-	<entry>2 November 2016</entry>
-	<entry><para>Remote Denial of Service
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:36.telnetd.asc">FreeBSD-SA-16:36.telnetd</link></entry>
-	<entry>6 December 2016</entry>
-	<entry><para>Possible &man.login.1; argument
-	    injection</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:37.libc.asc">FreeBSD-SA-16:37.libc</link></entry>
-	<entry>6 December 2016</entry>
-	<entry><para>&man.link.ntoa.3; buffer overflow</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:38.bhyve.asc">FreeBSD-SA-16:38.bhyve</link></entry>
-	<entry>6 December 2016</entry>
-	<entry><para>Possible escape from &man.bhyve.8; virtual
-	  machine</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:39.ntp.asc">FreeBSD-SA-16:39.ntp</link></entry>
-	<entry>22 December 2016</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:01.openssh.asc">FreeBSD-SA-17:01.openssh</link></entry>
-	<entry>10 January 2017</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:02.openssl.asc">FreeBSD-SA-17:02.openssl</link></entry>
-	<entry>23 February 2017</entry>
-	<entry><para>Fix OpenSSL RC4_MD5 cipher
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:03.ntp.asc">FreeBSD-SA-17:03.ntp</link></entry>
-	<entry>12 April 2017</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:04.ipfilter.asc">FreeBSD-SA-17:04.ipfilter</link></entry>
-	<entry>27 April 2017</entry>
-	<entry><para>Fix fragment handling panic</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-17:05.heimdal.asc">FreeBSD-SA-17:05.heimdal</link></entry>
-	<entry>12 July 2017</entry>
-	<entry><para>Fix KDC-REP service name validation
-	    vulnerability</para></entry>
+	<entry><para>No advisories.</para></entry>
+	<entry><para> </para></entry>
+	<entry><para> </para></entry>
       </row>
     </tbody>
   </tgroup>


More information about the svn-src-all mailing list