- Prune stale entries from 10.3-RELEASE.

- Prune entries from errata.xml and security.xml.
- Update versions to reflect 10.4-RELEASE.

Sponsored by:	The FreeBSD Foundation
This commit is contained in:
Glen Barber 2017-09-18 15:17:07 +00:00
parent 5a2840a603
commit b9eb76d00a
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/stable/10/; revision=323708
4 changed files with 15 additions and 357 deletions

View File

@ -46,7 +46,8 @@
&os;.</para>
<para>This errata document for &os; &release.prev; will be
maintained until the release of &os; &release.next;.</para>
maintained until &os; &release.prev; reaches
end-of-life.</para>
</abstract>
</info>
@ -235,28 +236,6 @@ boot</screen>
&prompt.root; pkg install <replaceable>xorg-server</replaceable> <replaceable>xorg</replaceable> <replaceable>gnome3</replaceable> [...]</screen>
</listitem>
<listitem>
<para>An issue was discovered where the &man.netstat.1;
<literal>-s</literal> option will cause a segmentation fault
on systems with <literal>IPSEC</literal> compiled into the
kernel. The issue was resolved in the
<literal>stable/10</literal> branch, and an Errata Notice is
planned after &release.prev; is released.</para>
<para>[2015-08-19] Resolved as FreeBSD-EN-15:12.</para>
</listitem>
<listitem>
<para>An issue was discovered that causes &man.make.1; to
generate noisy output when doing source-based upgrades from
&os; 9.3 and earlier. The issue was reported in PR 202277,
and after investigation and determining the issue does not
cause source-based upgrades to fail, a post-release Errata
Notice is planned.</para>
<para>[2015-08-19] Resolved as FreeBSD-EN-15:11.</para>
</listitem>
<listitem>
<para>An issue with &os; virtual machines with
<application>vagrant</application> was discovered that
@ -273,17 +252,6 @@ boot</screen>
virtual machine to successfully boot, allowing access via
<literal>vagrant ssh</literal>.</para>
</listitem>
<listitem>
<para>[2015-08-16] An error was discovered in the release
notes for &os; &release.prev; regarding the
<literal>drm</literal> device driver. The entry for r282199
states the driver was updated to match the version &linux;
3.8.13 version, however the entry should have noted the
change affects device-independent code, and does not bring
the <literal>drm</literal> driver fully in line with the
stated &linux; version.</para>
</listitem>
</itemizedlist>
</sect1>

View File

@ -19,128 +19,9 @@
<tbody>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:06.libc.asc">FreeBSD-EN-16:06.libc</link></entry>
<entry>4&nbsp;May&nbsp;2016</entry>
<entry><para>Performance regression in libc
&man.hash.3;</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:07.ipi.asc">FreeBSD-EN-16:07.ipi</link></entry>
<entry>4&nbsp;May&nbsp;2016</entry>
<entry><para>Excessive latency in x86 IPI
delivery</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:08.zfs.asc">FreeBSD-EN-16:08.zfs</link></entry>
<entry>4&nbsp;May&nbsp;2016</entry>
<entry><para>Memory leak in ZFS</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:09.freebsd-update.asc">FreeBSD-EN-16:09.freebsd-update</link></entry>
<entry>25&nbsp;July&nbsp;2016</entry>
<entry><para>Fix &man.freebsd-update.8; support of
&os;&nbsp;11.0-RELEASE</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:10.dhclient.asc">FreeBSD-EN-16:10.dhclient</link></entry>
<entry>11&nbsp;August&nbsp;2016</entry>
<entry><para>Better handle unknown options received from
aDHCP server</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:11.vmbus.asc">FreeBSD-EN-16:11.vmbus</link></entry>
<entry>11&nbsp;August&nbsp;2016</entry>
<entry><para>Avoid using spin locks for channel message
locks</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:12.hv_storvsc.asc">FreeBSD-EN-16:12.hv_storvsc</link></entry>
<entry>11&nbsp;August&nbsp;2016</entry>
<entry><para>Enable INQUIRY result check only on
Windows&nbsp;10 host systems</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:13.vmbus.asc">FreeBSD-EN-16:13.vmbus</link></entry>
<entry>11&nbsp;August&nbsp;2016</entry>
<entry><para>Register time counter early enough for TSC freq
calibration</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:14.hv_storvsc.asc">FreeBSD-EN-16:14.hv_storvsc</link></entry>
<entry>11&nbsp;August&nbsp;2016</entry>
<entry><para>Disable incorrect callout in
&man.hv.storvsc.4;</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:15.vmbus.asc">FreeBSD-EN-16:15.vmbus</link></entry>
<entry>11&nbsp;August&nbsp;2016</entry>
<entry><para>Better handle the GPADL setup failure in
Hyper-V</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:16.hv_storvsc.asc">FreeBSD-EN-16:16.hv_storvsc</link></entry>
<entry>11&nbsp;August&nbsp;2016</entry>
<entry><para>Fix SCSI INQUIRY checks and error
handling</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:17.vm.asc">FreeBSD-EN-16:17.vm</link></entry>
<entry>25&nbsp;October&nbsp;2016</entry>
<entry><para>Several virtual memory issues</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:19.tzcode.asc">FreeBSD-EN-16:19.tzcode</link></entry>
<entry>6&nbsp;December&nbsp;2016</entry>
<entry><para>Fix warnings about invalid timezone
abbreviations</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-16:20.tzdata.asc">FreeBSD-EN-16:20.tzdata</link></entry>
<entry>6&nbsp;December&nbsp;2016</entry>
<entry><para>Update timezone database
information</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-17:05.xen.asc">FreeBSD-EN-17:05.xen</link></entry>
<entry>23&nbsp;February&nbsp;2017</entry>
<entry><para>Xen migration enhancements</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-17:06.hyperv.asc">FreeBSD-EN-17:06.hyperv</link></entry>
<entry>12&nbsp;July&nbsp;2017</entry>
<entry><para>Boot compatibility improvements with
Azure virtual machines</para></entry>
<entry><para>No notices.</para></entry>
<entry><para>&nbsp;</para></entry>
<entry><para>&nbsp;</para></entry>
</row>
</tbody>
</tgroup>

View File

@ -6,23 +6,23 @@
<!-- Version of the OS we're describing. This needs to be updated
with each new release. -->
<!ENTITY release.current "10.3-STABLE">
<!ENTITY release.current "10.4-STABLE">
<!-- The previous version used for comparison in the "What's New"
section. For -CURRENT, we might point back to the last
branchpoint. -->
<!ENTITY release.prev "10.3-RELEASE">
<!ENTITY release.prev "10.4-RELEASE">
<!-- The previous stable release, useful for pointing user's at the
release they SHOULD be running if they don't want the bleeding
edge. -->
<!ENTITY release.prev.stable "10.2-RELEASE">
<!ENTITY release.prev.stable "10.3-RELEASE">
<!-- The next version to be released, usually used for snapshots. -->
<!ENTITY release.next "10.3-RELEASE">
<!ENTITY release.next "10.4-STABLE">
<!-- The name of this branch. -->
<!ENTITY release.branch "10.3-STABLE">
<!ENTITY release.branch "10.4-STABLE">
<!-- The URL for obtaining this version of FreeBSD. -->
<!ENTITY release.url "https://www.FreeBSD.org/snapshots/">
@ -38,8 +38,8 @@
<!-- WARNING: Do not forget to also change the release type in
doc.relnotes.mk when updating this -->
<!ENTITY release.type "snapshot">
<!ENTITY % release.type.current "INCLUDE">
<!ENTITY % release.type.snapshot "IGNORE">
<!ENTITY % release.type.current "IGNORE">
<!ENTITY % release.type.snapshot "INCLUDE">
<!ENTITY % release.type.release "IGNORE">
<![%release.type.current;[

View File

@ -19,200 +19,9 @@
<tbody>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:09.ntp.asc">FreeBSD-SA-16:09.ntp</link></entry>
<entry>29&nbsp;April&nbsp;2016</entry>
<entry><para>Multiple <application>ntp</application>
vulnerabilities.</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:17.openssl.asc">FreeBSD-SA-16:17.openssl</link></entry>
<entry>29&nbsp;April&nbsp;2016</entry>
<entry><para>Multiple <application>OpenSSL</application>
vulnerabilities.</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:18.atkbd.asc">FreeBSD-SA-16:18.atkbd</link></entry>
<entry>17&nbsp;May&nbsp;2016</entry>
<entry><para>Keyboard driver buffer overflow</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:19.sendmsg.asc">FreeBSD-SA-16:19.sendmsg</link></entry>
<entry>17&nbsp;May&nbsp;2016</entry>
<entry><para>Incorrect argument handling in
&man.sendmsg.2;</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:20.linux.asc">FreeBSD-SA-16:20.linux</link></entry>
<entry>31&nbsp;May&nbsp;2016</entry>
<entry><para>Kernel stack disclosure in Linux compatibility
layer</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:21.43bsd.asc">FreeBSD-SA-16:21.43bsd</link></entry>
<entry>31&nbsp;May&nbsp;2016</entry>
<entry><para>Kernel stack disclosure in 4.3BSD compatibility
layer</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:22.libarchive.asc">FreeBSD-SA-16:22.libarchive</link></entry>
<entry>31&nbsp;May&nbsp;2016</entry>
<entry><para>Absolute path traversal
vulnerability</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:23.libarchive.asc">FreeBSD-SA-16:23.libarchive</link></entry>
<entry>31&nbsp;May&nbsp;2016</entry>
<entry><para>Absolute path traversal
vulnerability</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:24.ntp.asc">FreeBSD-SA-16:24.ntp</link></entry>
<entry>3&nbsp;June&nbsp;2016</entry>
<entry><para>Multiple <application>ntp</application>
vulnerabilties</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:25.bspatch.asc">FreeBSD-SA-16:25.bspatch</link></entry>
<entry>25&nbsp;July&nbsp;2016</entry>
<entry><para>heap overflow vulnerability</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:26.openssl.asc">FreeBSD-SA-16:26.openssl</link></entry>
<entry>23&nbsp;September&nbsp;2016</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:27.openssl.asc">FreeBSD-SA-16:27.openssl</link></entry>
<entry>26&nbsp;September&nbsp;2016</entry>
<entry><para>Regression in <application>OpenSSL</application>
suite</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:29.bspatch.asc">FreeBSD-SA-16:29.bspatch</link></entry>
<entry>10&nbsp;October&nbsp;2016</entry>
<entry><para>Heap overflow vulnerability</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:30.portsnap.asc">FreeBSD-SA-16:30.portsnap</link></entry>
<entry>10&nbsp;October&nbsp;2016</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:31.libarchive.asc">FreeBSD-SA-16:31.libarchive</link></entry>
<entry>10&nbsp;October&nbsp;2016</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:33.openssh.asc">FreeBSD-SA-16:33.openssh</link></entry>
<entry>2&nbsp;November&nbsp;2016</entry>
<entry><para>Remote Denial of Service
vulnerability</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:35.openssl.asc">FreeBSD-SA-16:35.openssl</link></entry>
<entry>2&nbsp;November&nbsp;2016</entry>
<entry><para>Remote Denial of Service
vulnerability</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:36.telnetd.asc">FreeBSD-SA-16:36.telnetd</link></entry>
<entry>6&nbsp;December&nbsp;2016</entry>
<entry><para>Possible &man.login.1; argument
injection</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:37.libc.asc">FreeBSD-SA-16:37.libc</link></entry>
<entry>6&nbsp;December&nbsp;2016</entry>
<entry><para>&man.link.ntoa.3; buffer overflow</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:38.bhyve.asc">FreeBSD-SA-16:38.bhyve</link></entry>
<entry>6&nbsp;December&nbsp;2016</entry>
<entry><para>Possible escape from &man.bhyve.8; virtual
machine</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-16:39.ntp.asc">FreeBSD-SA-16:39.ntp</link></entry>
<entry>22&nbsp;December&nbsp;2016</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-17:01.openssh.asc">FreeBSD-SA-17:01.openssh</link></entry>
<entry>10&nbsp;January&nbsp;2017</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-17:02.openssl.asc">FreeBSD-SA-17:02.openssl</link></entry>
<entry>23&nbsp;February&nbsp;2017</entry>
<entry><para>Fix OpenSSL RC4_MD5 cipher
vulnerability</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-17:03.ntp.asc">FreeBSD-SA-17:03.ntp</link></entry>
<entry>12&nbsp;April&nbsp;2017</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-17:04.ipfilter.asc">FreeBSD-SA-17:04.ipfilter</link></entry>
<entry>27&nbsp;April&nbsp;2017</entry>
<entry><para>Fix fragment handling panic</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-17:05.heimdal.asc">FreeBSD-SA-17:05.heimdal</link></entry>
<entry>12&nbsp;July&nbsp;2017</entry>
<entry><para>Fix KDC-REP service name validation
vulnerability</para></entry>
<entry><para>No advisories.</para></entry>
<entry><para>&nbsp;</para></entry>
<entry><para>&nbsp;</para></entry>
</row>
</tbody>
</tgroup>